2010-09-12 10:24
Here is the step-by-step process to type the new
symbol! # Download Rupee font # Go to C->Windows->fonts. Copy paste the
downloaded file. #Open note pad. # Go to Format->font select rupee-Indian
font #To get the rupee symbol, just press the button which is ABOVE the ‘TAB’...
2010-09-12 10:19
its a simple registry trick by which you can display
your message at windows startup.You have to edit your registry.It will pop
message just before a user is going to log on.Check the following steps 1.Go to
your registry 2. Navigate...
2010-09-11 10:59
1. PC Safeguard I rarely let anyone use my PC
because I’m afraid he will mess it up, but it seems Microsoft has been thinking
at me and came with a solution. The PC Safeguard doesn’t let anyone mess your PC
settings, because after the user logs off, the configurations are reset back...
2010-09-11 10:39
To change or specify the IP address of your computer
for your own local area network (LAN), follow the below steps. Keep in mind that
if you're connecting to the Internet with a broadband connection, adjusting your
network settings may cause issues with your broadband connection. Finally, if
your...
2010-09-11 10:33
Explain to your followers what retweeting is and
encourage them to retweet your links. Retweeting pushes your @username into
foreign social graphs, resulting in clicks back to your profile. Track your
retweets using retweetist. Fill out your bio. Your latest tweets and @replies
don’t mean much...
2010-09-11 10:29
Cant you delete a file?Is it showing error message
when trying to delete?Here is the solution for this problem.Just go through the
below post and try to delete. Open a Command Prompt window and leave it open.
Close all open programs. Click Start, Run and enter TASKMGR.EXE Go to the...
2010-09-11 10:22
want to Hear fm radio without connecting the
headphones in your mobile phone,most of the mobile phones have the condition
that you have to connect the earphones or headphones to hear fm.but we have come
with an trick for motorola mobiles,so that you can hear fm in loud mode without
using...
2010-09-11 10:04
In india there are more than 50 crores of mobile
customers and now a days the number of telemarketing calls you receive everyday
is keeping on increasing and people are frustrated when they receive a call.Even
India’s Finance minister Pranab Mugerjee received a telemarketer’s call when
attending an...
2010-09-11 09:51
well I am going to share a simple trick for block your
enemy sim card,Blocking a sim card is too simple.What you have to do is just
enter the below code in the desired phone **04*3814*7529*68243# Entering of
above code will ask you to enter the PUK code.To solve this issue just call
customer care...
2010-09-11 09:39
Sometimes, the beautiful, elegant, high resolution
animated and dynamic Windows 7 boot screen UI may be changed to or replaced with
Windows Vista boot screen, normally when user adds a Windows 7 entry in boot
menu or accidentally when user attempts to repair the startup menu items with
Windows...
2010-09-11 09:27
Google Gmail user may want to reset the password which
used to login into the Gmail account via web, POP3 and IMAP as the original
password has been forgotten, or misplaced. Gmail credentials integrates and
bases on Google Account. So changing the password for Gmail will also change
the...
2010-09-11 09:13
During initial setup of Windows XP Mode (XPM) after
installing the free and fully licensed Windows XP virtual machine onto Windows 7
Virtual PC, user is required to set a password for default XPMUser account. By
default, Windows XP Mode will save and remember user name and password login...
2010-09-05 11:24
in normal life few things cause more panic than
dropping your cell phone in water, but it happens. Dropping your phone in water
does not necessarily mean that you will have to replace it. If you know what to
do after your phone has been submerged in water, you should be able to save
it...
2010-09-05 11:09
In the late 900’s, King Harald Bluetooth Gormson
united Denmark and Norway in Christianity and ruled both countries as king until
deposed by his son. In 1994 the Ericsson company developed a short-range
wireless communication protocol which brought about the ability to connect many
different...
2010-08-06 09:13
Step 1 Download and install a free Yahoo! Messenger
status checking program such as Buddy Spy. Step 2 Launch the application after
completing the installation and click the "Buddy Spy" button on the left panel.
Step 3 Select "Single Scan" and type...
2010-08-06 09:09
Step 1 Open iTunes. Step 2 Find the song that you want
to make into a ringtone. Step 3 Listen to the song and find the part of it you
want to use. The chorus may be a good place to start. Step 4 Write down the
start and stop times...
2010-07-25 11:04
Apple iPhone is so popular that has triggered many
peripherals or accessories built surrounding it. In order to fill up the gap, a
new infra red based device, named as RedEye mini has been released by ThinkFlood
with intention to transform your iPhone, iPod and even iPad into a portable
remote...
2010-07-24 09:19
In WindowHomepages XP , it’s possible and very easy to
add a second display to your PC. But first of all, you will need to have a
second video display card or a video card that has a second Video Out port, and
of course, the second display monitor, be it CRT monitor or LCD panel. Plug...
2010-07-24 08:59
Whenever there is any system problem, especially the
dread BSoD (Blue Screen of Death), most users first reaction is probably to go
into Safe Mode to try to troubleshoot Windows. Safe Mode loads and starts just
basis files and drivers necessary to run Windows. Most drivers, including...
2010-07-20 11:56
Well, you need not wait any longer to have your share
of 3D. All you need is a pair of anaglyph goggles and a fairly powerful system.
iZ3D is actually a manufacturer of 3D-capable monitors,their driver available
below, The driver console has an option to turn on anaglyph, which converts ...
2010-07-18 22:57
Step 1 Open the DOS prompt on your computer. The way
you get to the DOS prompt depends on what version of Windows you are using. If
you are using Windows 95 or Windows 98, click "Start." then click "Programs" and
end by clicking "MS-DOS." If you are using Windows NT, Windows 2000...
2010-07-18 22:32
Step 1 Click on the "Start" menu and choose "Connect
To." A list of available networks is displayed in a window. Your friend will
need to know the name of your network. Step 2 Click on the network you want to
connect to, and then click "Connect." ...
2010-07-18 22:23
first install Virtualbox. Open up Virtualbox and click
on New at the top left. At the Create New Virtual Machine window, click Next. At
this window type OSX as the name and it will automatically change the system and
version. The next window will let you choose your RAM amount: If you can...
2010-07-11 23:08
There are many reason why you need to know how to
block a website. Some of the most common reasons are you have been targeted by
spammers who use adware and popups to attack your PC. Other reasons may be to
prevent your children from having access to certain site content such as porn
and...
2010-07-10 20:32
Step 1 A router and home network setup is typically
used for directing your DSL internet line to one or more computers in your home.
Each computer will need a network adapter with a plug that accepts the network
cable. In the case of wireless internet, each computer will need a...
2010-07-10 01:02
Securing an organization's assets requires work, and
there are many different ways to classify controls. This white paper examines
three common types of controls are administrative, technical, and physical.
Regardless of how these controls are grouped or what list you use to classify,
security...
2010-07-10 00:54
The Blackberry is easily the most popular Smartphone
on the market and, according to cellphones.org, the most ‘natively’ secure. Just
by having a Blackberry, you are one step ahead but that doesn’t mean you don’t
still have to enable your security settings. Enable your password. Under ...
2010-07-10 00:45
What kind of information do you have on your business
card? Company name? Check. Your name and title? Check. Business address? Check.
Mobile work phone number? Wait a minute. CSO recently sat down with Trust
Digital, a firm that specializes in mobile security, for a demonstration on how
to hack...
2010-07-10 00:34
The past few months has seen the mobile phone industry
thrown into turmoil as the computer hacking community has carried out successful
attacks against mobile phone call security. I wrote an article about such a
hacka while back, but at that point it remained a theory rather than a ...
2010-07-10 00:16
The trouble with mobile phone spam is that it is not
only annoying, but it can also be expensive. Some people pay to receive text
messages. In 2006 for instance, Sprint® was sued for sending text message spam
and advertisements for their own company to their customers. Since each
message...
2010-07-07 19:23
Want to control a friend's cell phone remotely and
make "free" calls from it? In this hack how-to video, you'll learn how to hack
Bluetooth-enabled cell phones with your Sony Ericsson or Nokia phone and the
Super Bluetooth Hack—or "BT Info"—, a free program easily found through...
2010-07-07
19:16
so many peoples may have seen the wealth of websites
that offer a variety of vehicle location systems for use in trade. There are
smaller sites on the Internet, however, recommends the use of such vehicle
location systems for use in the private sphere. If you decide to install a GPS
tracking...
2010-07-07 19:07
If you've ever lost while driving without a map, you
know that feeling is fear. In the past, the road map or atlas of paper can find
their way was, but the monsters were bulky tri-folded almost more trouble than
they're worth. , Embedded system technology is fortunately modern bridge the
gap...
2010-07-04 23:03
Google is a treasure trove full of important
information, especially for the underground world. This Potential fact can also
be utilized in the data for the username and password stored on a server. If the
administrator save important data not in the complete system authentifikasi
folder, then...
2010-07-03 18:12
Well this is an interesting article. It is a
sub-section of a HackingTechnique known as a google hacking.All what we are
looking at are unsecured cams from around the world that are interfaced with the
internet. So how do you find such cameras. Just google these following strings
and select any...
2010-07-03 18:05
hackers can easily connect and manipulate your phone
simply by using a Bluetooth connection. We’re here to explain how it’s done and
how to protect yourself from such an attack. Bluetooth is a short-range wireless
communication technology that uses the 2.4-GHz frequency range for its...
2010-07-02 10:20
using the hypertext markup language (HTML) "script"
tags, you can enhance your Web pages with a client-side script like JavaScript
or VBScript. Client-side scripting languages let you create features on your
website that encourage interactivity with your visitors because they respond to
the...
2010-07-02 09:51
Step 1 Write your HTML message in your favorite PHP
editor or text editor near the top of your PHP file after the opening PHP tag.
Assign it to a variable: $message = "This is an <strong>HTML
Message</strong>!"; Step 2 Copy and paste the following...
2010-06-28 20:29
Hack 12 deals with getting event log information. Hack
77 presents answers to common security-related FAQs, and Hack 98 talks about the
Automated System Recovery (ASR), a new feature of Windows Server 2003 that makes
recovering from a disaster a whole lot easier. Windows Server Hacks 12:...
2010-06-13 12:56
Steps When the computer starts up, hold down F8
before you see the "Windows Starting" screen. This will bring you to a screen
with choices. Your best bet will be "Safe Mode with Command Prompt". You can
then do as you want. ..
|