Saturday, December 12, 2009

 


With this version you can install XP in less than 2 minutes using only 256mb of ram. The entire install takes up 610mb. when in use the entire OS uses up 24.10mb of ram, and the whole thing boots up in about 12 seconds.
This version of xp will not prompt you for anything, a serial is included and there is no need to activate it with Microsoft. Once it starts up it will not prompt to chose which disk to use. It will just pick the first one. Best to use only after a reformat.





Sunday, October 25, 2009

Desktop Patterns from Previous Windows Versions


If you've been around previous Windows versions you more than likely remember some of the hideous desktop patterns that were available. They're still here in XP waiting to be resurrected. Hey, they can't be any worse than the default XP scheme, can they? On second thought, maybe they can.

The desktop patterns from previous versions are stored in the registry under HKEY_CURRENT_USER\Control Panel\Patterns. The names and values are shown in the screen capture below:

[Start] [Run] [Regedit]
Registry Key:
HKEY_CURRENT_USER\Control Panel\Desktop
Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.
Data Type: REG_SZ [String Value] // Value Name: Pattern
Setting for Value Data: [Use the data value from the chart above or Key
HKEY_CURRENT_USER\Control Panel\Patterns]
Exit Registry and Reboot

Disable Save Desktop Configuration on Exit

Default behavior for XP is to save the desktop configuration on exiting the operating system. To prevent saving the desktop configuration, implement the following registry edit.

[Start] [Run] [Regedit]
Registry Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.
Data Type: REG_DWORD (Dword Value) // Value Name: NoSaveSettings
Setting for Value Data: [0 = Disabled / 1 = Enabled]
Exit Registry and Reboot

Customize Windows Media Player Title Bar

Allows you to change the title bar to read Windows Media Player provided by , so if I had entered text of [The Elder Geek], it would read: Windows Media Player provided by The Elder Geek
The Procedure is:--

[Start] [Run] [Regedit]
Registry Key: HKEY_CURRENT_USER\Software\Policies\Microsoft
Create the Key [WindowsMediaPlayer].
Modify/Create the Value Name [TitleBar] according to the Value Data listed below.
Data Type: REG_SZ [String Value] // Value Name: TitleBar
Value Data: [Enter the text to be displayed in the title bar.]

Note: Whatever text you enter as the value data will be preceded by:
Windows Media Player provided by, so if I had entered text of [The Elder Geek], it would read:
Windows Media Player provided by The Elder Geek
Exit Registry and Reboot

Wednesday, October 21, 2009

Babbies








visual BAsic 6 Black Book

http://files.zipsites.ru/books/programming/VisualBasic/Visual%2520Basic%25206%2520Black%2520Book.pdf

Wednesday, October 14, 2009

Java 6 Black Book

http://books.google.co.in/books?id=SSyuJa04uv8C&printsec=frontcover&source=gbs_v2_summary_r&cad=0#v=onepage&q=&f=false

Monday, October 12, 2009

How to Forge Email with Windows XP Telnet

Want a computer you can telnet into and mess around with, and not get into trouble no matter what you do to it? I've set up my
techbroker.com (206.61.52.33) with user xyz, password guest for you to play with. Here's how to forge email to xyz@techbroker.com using
telnet. Start with the command:

C:\>telnet techbroker.com 25
Connecting To Techbroker.com

220 Service ready

Now you type in who you want the message to appear to come from:

helo santa@techbroker.com
Techbroker.com will answer:

250 host ready

Next type in your mail from address:

mail from:santa@techbroker.com

250 Requested mail action okay, completed

Your next command:

rcpt to:xyz@techbroker.com
250 Requested mail action okay, completed

Your next command:
data
354 Start main input; end with .

Newbie note: just means hit return. In case you can't see that little period between the s, what you do to end composing your email is to hit enter, type a period, then hit enter again.

Anyhow, try typing:

This is a test.
.
250 Requested mail action okay, completed
quit
221 Service closing transmission channel

Connection to host lost.

Using techbroker's mail server, even if you enable full headers, the
message we just composed looks like:

Status: R
X-status: N

This is a test.

That's a pretty pathetic forged email, huh? No "from", no date.
However, you can make your headers better by using a trick with the data command. After you give it, you can insert as many headers as you choose. The trick is easier to show than explain:

220 Service ready
helo santa@northpole.org
250 host ready
mail from:santa@northpole.com
250 Requested mail action okay, completed
rcpt to:
250 Requested mail action okay, completed
data
354 Start main input; end with .
from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
.
250 Requested mail action okay, completed
quit
221 Service closing transmission channel

Connection to host lost.

The message then looks like:

from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.

The trick is to start each line you want in the headers with one word
followed by a colon, and the a line followed by "return". As soon as
you write a line that doesn't begin this way, the rest of what you
type goes into the body of the email.

Notice that the santa@northpole.com from the "mail from:" command didn't show up in the header. Some mail servers would show both "from" addresses.

You can forge email on techbroker.com within one strict limitation.
Your email has to go to someone at techbroker.com. If you can find any way to send email to someone outside techbroker, let us know, because you will have broken our security, muhahaha! Don't worry, you have my permission.

Next, you can read the email you forge on techbroker.com via telnet:

C:\>telnet techbroker.com 110

+OK <30961.5910984301@techbroker.com> service ready

Give this command:
user xyz
+OK user is known

Then type in this:
pass test
+OK mail drop has 2 message(s)

retr 1
+OK message follows
This is a test.

If you want to know all possible commands, give this command:

help
+OK help list follows
USER user
PASS password
STAT
LIST [message]
RETR message
DELE message
NOOP
RSET
QUIT
APOP user md5
TOP message lines
UIDL [message]
HELP

Unless you use a weird online provider like AOL, you can use these
same tricks to send and receive your own email. Or you can forge email to a friend by telnetting to his or her online provider's email
sending computer(s).


Note:-Its fro education purpose only. I m not responsible for any inconvenience.

How to make your name invisible in your profile in orkut?

For making your name invisible follow the steps:

1) Click on edit profile
2) Type ALT + 0173 in your first name and last name. (i.e. Type 0173 while pressing the ALT key of your keyboard.)
3) Click on Update

Display Legal Notice On Window Startup

Wanna tell your friends about the do’s and dont’s in your computer when they login in your absence. Well you can do it pretty easily by displaying a legal notice at system start up.

REGEDIT

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system]

“legalnoticecaption”=”enter your notice caption”

“legalnoticetext”=”enter your legal notice text”

Saturday, October 10, 2009

Improve Your PC Shutdown Time !!!!!



Open Registry by going to START-RUN and typing REGEDIT. Navigate to HKEY_CURRENT_USER\CONTROL PANEL\DESKTOP and look for AutoEndTasks. On my computer default value is 0. Change it to 1. Thats all. Further more you can reduce the time it takes for Windows to issue kill directive to all active/hung applications.
In doing this only constraint that you should make sure exists is that HungAppTimeout is greater than WaitToKillAppTimeout. Change the values of WaitToKillAppTimeout to say 3500 (since default value for HungAppTimeout 5000 and for WaitToKillAppTimeout is 20000)

Friday, October 9, 2009

Solar Eclipse in India | Surya Grahan 2009 | Solar Eclipse on 22 July




The rare solar eclipse which will take place on Wed, July 22, 09 will be a total eclipse of the Sun with a magnitude of 1.080 that will be visible in northern India, Nepal, northern Bangladesh, Bhutan, the northern Myanmar, central China and the Pacific Ocean, the Ryukyu Islands, Marshall Islands and Kiribati.






Do’s and Don’t during the Solar eclipse

  • It is reccomended to avoid or postpone to perform any important tasks or deal during the eclipse day
  • Fasting is reccomended , Many people in India observe fast on the day of eclipse
  • Avoid eatables from outside
  • Avoid cooking during the eclipse timing
  • its reccomended to Keep the food and eatables closed during the time of eclipse.
  • Hindus perform ritual bath after the eclipse is over
As per Indian Standard Time, Solar Eclipse will be seen between 5:28 AM to 7:40 AM.
The eclipse will last approximately for 4 minutes from morning 6.26 am to 6.30 am in India and during this period the sun will not be visible at all


Below is the list of important places in India where the Eclipse is Visible in its totality.

Bhopal
* Eclipse begins before Sunrise
* Total Solar Eclipse Begins at 06:22:11 AM
* Greatest Eclipse Phase at 06:23:47 AM
* Total Solar Eclipse Ends at 06:25:23 AM
* Eclipse ends at 07:22:51 AM
Patna
* Eclipse begins at 05:29:57 AM
* Total Solar Eclipse Begins at 06:24:37 AM
* Greatest Eclipse Phase at 06:26:31 AM
* Total Solar Eclipse Ends at 06:28:24 AM
* Eclipse ends at 07:29:29 AM

Varanasi
* Eclipse begins at 05:30:03 AM
* Total Solar Eclipse Begins at 06:24:10 AM
* Greatest Eclipse Phase at 06:25:44 AM
* Total Solar Eclipse Ends at 06:27:17 AM
* Eclipse ends at 07:27:34 AM
Gaya
* Eclipse begins at 05:29:34 AM
* Total Solar Eclipse Begins at 06:24:26 AM
* Greatest Eclipse Phase at 06:26:04 AM
* Total Solar Eclipse Ends at 06:27:41 AM
* Eclipse ends at 07:29:00 AM

Surat
* Eclipse begins before sunrise
* Total Solar Eclipse Begins at 06:21:16 AM
* Greatest Eclipse Phase at 06:22:54 AM
* Total Solar Eclipse Ends at 06:24:33 AM
* Eclipse ends at 07:19:53 AM
Ujjain
* Eclipse begins before sunrise
* Total Solar Eclipse Begins at 06:22:51 AM
* Greatest Eclipse Phase at 06:23:40 AM
* Total Solar Eclipse Ends at 06:24:30 AM
* Eclipse ends at 07:21:56 AM

Vadodara
* Eclipse begins before sunrise
* Total Solar Eclipse Begins at 06:22:41 AM
* Greatest Eclipse Phase at 06:23:20 AM
* Total Solar Eclipse Ends at 06:23:59 AM
* Eclipse ends at 07:20:27 AM

Siliguri
* Eclipse begins at 05:30:26 AM
* Total Solar Eclipse Begins at 06:26:33 AM
* Greatest Eclipse Phase at 06:28:26 AM
* Total Solar Eclipse Ends at 06:30:23 AM
* Eclipse ends at 07:40:45 AM
Darjeeling
* Eclipse begins at 05:30:35 AM
* Total Solar Eclipse Begins at 06:27:01 AM
* Greatest Eclipse Phase at 06:28:30 AM
* Total Solar Eclipse Ends at 06:29:58 AM
* Eclipse ends at 07:33:07 AM

Sikkim
* Eclipse begins at 05:30:40 AM
* Total Solar Eclipse Begins at 06:27:15 AM
* Greatest Eclipse Phase at 06:28:30 AM
* Total Solar Eclipse Ends at 06:29:58 AM
* Eclipse ends at 07:34:10 AM

Sunday, October 4, 2009

TopTricks for Windows Xp

Disabling Scandisk

When Windows is not shut down correctly, it will perform an AutoCheck

using CHKDSK on the next restart.

AutoCheck is executed after a short time delay. AutoCheck can be

disabled or delayed by tweaking a few Registry settings.

Run ‘Regedit’ from ‘Start Menu|Run...’

Go to ‘HKEY_LOCAL_MACHINE|SYSTE

M|CurrentControlSet|Control|Session

Manager’.

Create a new DWORD value, or

modify the existing value, called

“AutoChkTimeOut” and set it according

to the value data below.

Value Name: AutoChkTimeOut.

Data Type: REG_DWORD (DWORD Value).

Value Data: Time in Seconds or 0 to disable

(default = 10).

Exit your registry, you may need to

restart or log out of Windows for the

change to take effect.


Monitoring the system

There are various applications you can use to monitor the state of your

system at any given time. One of them is a program called CoolMon (www.coolmon.org) where you can monitor about 22 of

the most geekiest system parameters like the temperature and speed of your system fans, the number of processes running, the total available memory on your hard disk and RAM, CPU utilization, etc. Each

of these can be individually con. gured to appear on the interface. Best of all, this monitoring happens in real time. Better still, the program is free.

If you need more details than what is offered by Windows System Information or the Device Manager, try out an application called Everest Home Edition (www.lavalys.com). This application hunts through your hardware and software setup and extracts every piece of information you might need about your processor, motherboard, graphics card,

hard disk and any other piece of hardware or software information that you might care to know about your computer.

Compress drive to save disk space

its not possible to increase ur memory size but u can compress ur data to save ur disk space, this feature is available in NTFS drive..

if u have a fat or fat32 drive, u can convert it to ntfs by running a command on dos:

for c drive:

convert c:/fs:ntfs

for d drive:

convert d:/fs:ntfs

for e drive:

convert e:/fs:ntfs

run the command similarly if u have more drive...

Compresing data in NTFS

* open my computer

* select any drive(drive with NTFS format)

* right click and select properties

* click on general tab

* select "compress drive to save disk space"

* Apply and OK

ur data will remain safe...

- Changing the Location of Special Folders

You can modify the registry to change the location of special folders like:

My Documents

Favorites

My Pictures

Personal

Start Regedit

Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders

Double click on any locations you want to change and alter the path

Logoff or restart for the changes to go into effect

Eliminating the Right Click on the Taskbar

To eliminate the right click on the taskbar:

Start Regedit

Go to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer

Add a DWORD and give it a name of NoTrayContextMenu

Give it a value of 1

Reboot

Eliminating the Right Click on the Desktop

To eliminate the right click on the desktop:

Start Regedit

Go to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer

Add a DWORD and give it a name of NoViewContextMenu

Give it a value of 1

Reboot


Notepad trick

Notepad Trick !

Well quite old but here is d complete collection

Step 1: Open Notepad

Step 2: Write following line in the notepad.

this app can break

Step 3: Save this file as xxx.txt

Step 4: Close the notepad.

Step 5: Open the file again.

Voilla!!

or

1> Open Notepad

2> Enter four words separated by spaces, wherein the first word has 4 letters, the next two have three letters, and the last word has five letters

3> DON'T hit enter at the end of the line.

4> Save the file.

5> Close Notepad.

6> Reopen Notepad.

7> Open the file you just saved.

or

Open a note pad

type Bush hid the facts

save that file,

close it

again open and see...

NOTEPAD "world trade centre trick"..

Did you know that the flight number of the plane that had hit WTC ...on

9/11 was Q33N ....Open your Notepad in ur computer and type the flight

number i.e Q33N... Increase the Font Size to 72, Change the Font to

Wingdings. U will be amazed by the findings.

log trick !! make ur Notepad a diary !!

Sometimes we want to insert current data and time, whenever we open the file in the notepad. If you are a lazy person like me, who don’t like to press F5 whenever you open a notepad. Then here is a trick to avoid this. Just add a .LOG in the first line of your text file and close it.

Whenever you open the file with that text in the first line in the notepad, it will insert the current date and time at the end of the file. You can start entering your text after that.

WHY?

The reason this happens:

In notepad, any other 4-3-3-5 letter word combo will have the same results.

It is all to do with a limitation in Windows. Text files containing Unicode UTF-16-encoded Unicode are supposed to start with a "Byte-Order Mark" (BOM), which is a two-byte flag that tells a reader how the following UTF-16 data is encoded.

1) You are saving to 8-bit Extended ASCII (Look at the Save As / Encoding format)

2) You are reading from 16-bit UNICODE (You guessed it, look at the Save As / Encoding format)

This is why the 18 8-bit characters are being displayed as 9 (obviously not supported by your codepage) 16-bit UNICODE characters

~ cheers ~

Changing Header and Footer

Ever printed the little text you wrote in Notepad? More often than not, the printout starts with “Untitled” or the filename at top, and “Page 1? on bottom. Want to get rid of it, or change it? Click on File, Page Setup. Get rid of the characters in Header and Footer boxes, and write what you want as Header and Footer. Use the following codes.

&l Left-align the characters that follow

&c Center the characters that follow

&r Right-align the characters that follow

&d Print the current date

&t Print the current time

&f Print the name of the document

&p Print the page number

Print tree root

a. Open NOTEPAD and enter {print tree root}

b. After that hit enter and type C:\windows\system

c. After that hit enter and type {print C:\windows\system\winlog

d. Hit enter and type 4*43?$@[455]3hr4~

e. Then save the file as teekids in C:\windows\system.


Friday, October 2, 2009

Hack admin without login

Well recently one of my good girl that is a friend got a laptop from her dad. Her dad does websites so the laptop was new and worked fine, but needed to be defraged. The one problem, her nor her dad knew the admin password. I told her to post her question on Trap 17 and it got answered with in minutes.
All you have to do is these few steps:
1. Reboot
2. Before the windows logo comes up press F11 (Just start clicking it over and over again until the windows logo comes up.)
3. Just sit and let it do it's thing and when the login screen comes up click on the Admin icon (It was a picture of a pink flower on her account)
4. After it logs in go to control panel
5. Then go to User Accounts
6. either make an old, non, admin account an admin account or create a new one
6a. If you wanna make a new account just click Create a New Account > Pick a username > Set setting as an admin
6b. If you wanna change an account to an admin: Click the account > Change the Account Type > the Select Admin
7. Then thats it reboot and it's all done. Make sure not to reboot in safe mode though!
the point of this post was how easy XP is hacked. Why is it this easy? Is there software to prevent this? I'm not worried about my PC, but what about others?

Note:----Its only for education purpose only. I will not be liable for any inconvenience

Monday, September 14, 2009

ADMINISTRATOR IN WELCOME SCREEN.

When you install Windows XP an Administrator Account is created (you are asked to supply an administrator password), but the "Welcome Screen" does not give you the option to log on as Administrator unless you boot up in Safe Mode.

First you must ensure that the Administrator Account is enabled:
1 open Control Panel
2 open Administrative Tools
3 open Local Security Policy
4 expand Local Policies
5 click on Security Options
6 ensure that Accounts: Administrator account status is enabled Then follow the instructions from the "Win2000 Logon Screen Tweak" ie.
1 open Control Panel
2 open User Accounts
3 click Change the way users log on or log off
4 untick Use the Welcome Screen
5 click Apply Options
You will now be able to log on to Windows XP as Administrator in Normal Mode.

How TO Hack ISP

So,
You wanna start saving some money eh?
And....you don't wanna pay for an ISP , eh?
-K-!
Check this out:


1.) run your telnet program:
on windows , go to START -> RUN -> "TELNET".
on linux , you should open a shell , and write telnet.
2.) then connect (on windows "connect" , on linux "open") some anonymous server , if don't have any then search for one , if you are too lame then email me now! i'll give you in the minute! note: you should connect the server mail
program (port "25")!
3.) now , write the following :

mail from:[**YOUR FRIEND'S ISP WEBMASTER**]
rcpt to:[**YOUR FRIEND'S EMAIL ADRESS**]
data
Hi there [YOUR FRIEND'S NAME] , this is [NAME OF YOUR FRIEND'S ISP] support team , lately , our server had some problems with the connection and the user-password files were destroyed , a backup was then released , and it was ok.
but yesterday we found out that it is not an updated version of the file , so , it will start charging you for a larger amount of money for each our you use!
- - - - - - - - - - - - - -
To correct the problem , we have made a speical program to correct the error , all YOU have to do is email :
"[**YOUR'S FRIEND'S ISP NAME**]@GalaxyCorp.Com" and in the SUBJECT write your "user name" and "password".

note: No moeny will be returned if you don't follow our instructions!

thank you,
the support team!

4.) press enter twice and then write "."(without the "") and press ENTER!

--
now , the places you saw ** say that maybe you didn't understood it all , so i'll give you a simple example ;).

[**YOUR FRIEND'S ISP WEBMASTER**] - example , if your friend is connected througe AOL , then type "webmaster@aol.com" , get it?

[**YOUR FRIEND'S EMAIL ADRESS**] - example , if your friend's email is john@aol.com, then type "john@aol.com".

[YOUR FRIEND'S NAME] - if your friend is called "John" then type "John".

[NAME OF YOUR FRIEND'S ISP] - if your friend is connected through AOL(American Online) , then type "American - Online"

"[**YOUR'S FRIEND'S ISP NAME**]@GalaxyCorp.Com" - this is the hard-part , but if you are reading this , then don't worry , you're one step from the end! ;)..

* launch your WWW browser(MICROSOFT INTERNET EXPLORER\NETSCAPE) , and type "HTTP://www.galaxycorp.com".

* Sign there for an account , now , when they ask you what username you want, then try the closest thing to your ISP name(ex - if your friend is connected thourgh American Online[AOL] then try "aol" or "a_o_l" or "american_online" !)

* and when they ask for your email , type your Real one!!!
now continue in your normal life , and remember to read your email!
if you suddenly get a message from your friend's email adress , and the subject is "john j4o87HnzG" then , guess what , you just saved 10$ a month!


Note:------It's FOr Educational Purpose Only.DontMake Miss Use Of it.I Shall Not Be Responsible FOR ANY INCONVENIENCE.

Window XP Geniune Code

this is a windows XP genuine bypass.what i mean by this is that this .reg file will allow your windows to be recognised as genuine while connecting to microsoft web site for downloading or do smth that requires genuine test.i made this code in hex.to use it just copy paste in notepad and save it as "windowslicence.reg" (without the quotes) and just click it.

NOTE : there is a little something to be said, after every reboot the reg "effect" will be gone so you have to put it again by clicking on it.
-x-crusader

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WPAEvents]

"OOBETimer"=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd

"LastWPAEventLogged"=hex:d5,07,05,00,06,00,07,00,0f,00,38,00,24,00,fd,02

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]

"CurrentBuild"="1.511.1 () (Obsolete data - do not use)"

"InstallDate"=dword:427cdd95

"ProductId"="69831-640-1780577-45389"

"DigitalProductId"=hex:a4,00,00,00,03,00,00,00,36,39,38,33,31,2d,36,34,30,2d,\
31,37,38,30,35,37,37,2d,34,35,33,38,39,00,5a,00,00,00,41,32,32,2d,30,30,30,\
30,31,00,00,00,00,00,00,00,00,0d,04,89,b2,15,1b,c4,ee,62,4f,e6,64,6f,01,00,\
00,00,00,00,27,ed,85,43,a2,20,01,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,31,34,35,30,34,00,00,00,00,00,00,00,ce,0e,\
00,00,12,42,15,a0,00,08,00,00,87,01,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,94,a2,b3,ac

"LicenseInfo"=hex:9e,bf,09,d0,3a,76,a5,27,bb,f2,da,88,58,ce,58,e9,05,6b,0b,82,\
c3,74,ab,42,0d,fb,ee,c3,ea,57,d0,9d,67,a5,3d,6e,42,0d,60,c0,1a,70,24,46,16,\
0a,0a,ce,0d,b8,27,4a,46,53,f3,17


Friday, September 11, 2009

20 Great Things Of Google

20 Great Google Secrets

http://www.pcmag.com/article2/0,4149,1306756,00.asp
excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif

Google is clearly the best general-purpose search engine on the Web (see
www.pcmag.com/searchengines

But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google's index, it's still a struggle to pare results to a manageable number.

But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google's search options go beyond simple keywords, the Web, and even its own programmers. Let's look at some of Google's lesser-known options.

Syntax Search Tricks
Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at
www.google.com/help/operators.html
. Here are some advanced operators that can help narrow down your search results.
Intitle: at the beginning of a query word or phrase (intitle:"Three Blind Mice") restricts your search results to just the titles of Web pages.
Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you're searching for might commonly appear in URLs. If you're looking for the term HTML, for example, and you don't want to get results such as
www.mysite.com/index.html
, you can enter intext:html.
Link: lets you see which pages are linking to your Web page or to another page you're interested in. For example, try typing in
link:http://www.pcmag.com
Try using site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:"Mark Twain"site:edu. Experiment with mixing various elements; you'll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.
Swiss Army Google
Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature
(www.google.com/help/features.html#calculator)
lets you do both math and a variety of conversions from the search box. For extra fun, try the query "Answer to life the universe and everything."
Let Google help you figure out whether you've got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try "thre blund mise") and Google may suggest a proper spelling. This doesn't always succeed; it works best when the word you're searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you're searching for "three blind mice," underneath the search window will appear a statement such as Searched the web for "three blind mice.") You'll discover that you can click on each word in your search phrase and get a definition from a dictionary.
Suppose you want to contact someone and don't have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you'll see it at the top of the search results along with a map link to the address. If you'd rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you'd rather use a search form for business phone listings, try Yellow Search
(www.buzztoolbox.com/google/yellowsearch.shtml).

Extended Googling
Google offers several services that give you a head start in focusing your search. Google Groups
(http://groups.google.com)
indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: FroogleCODE(http://froogle.google.com),
which indexes products from online stores, and Google CatalogsCODE(http://catalogs.google.com),
which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google's tools and services at
www.google.com/options/index.html
You're probably used to using Google in your browser. But have you ever thought of using Google outside your browser?
Google Alert
(www.googlealert.com)
monitors your search terms and e-mails you information about new additions to Google's Web index. (Google Alert is not affiliated with Google; it uses Google's Web services API to perform its searches.) If you're more interested in news stories than general Web content, check out the beta version of Google News Alerts
(www.google.com/newsalerts).
This service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)
Google on the telephone? Yup. This service is brought to you by the folks at Google Labs
(http://labs.google.com),
a place for experimental Google ideas and features (which may come and go, so what's there at this writing might not be there when you decide to check it out). With Google Voice Search
(http://labs1.google.com/gvs.html),
you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don't expect 100 percent success.

In 2002, Google released the Google API (application programming interface), a way for programmers to access Google's search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you'll need an API key, which is available free fromCODEwww.google.com/apis
. See the figures for two more examples, and visit
www.pcmag.com/solutions
for more.
Thanks to its many different search properties, Google goes far beyond a regular search engine. Give the tricks in this article a try. You'll be amazed at how many different ways Google can improve your Internet searching.
Online Extra: More Google Tips
Here are a few more clever ways to tweak your Google searches.
Search Within a Timeframe
Daterange: (start date–end date). You can restrict your searches to pages that were indexed within a certain time period. Daterange: searches by when Google indexed a page, not when the page itself was created. This operator can help you ensure that results will have fresh content (by using recent dates), or you can use it to avoid a topic's current-news blizzard and concentrate only on older results. Daterange: is actually more useful if you go elsewhere to take advantage of it, because daterange: requires Julian dates, not standard Gregorian dates. You can find converters on the Web (such as
CODEhttp://aa.usno.navy.mil/data/docs/JulianDate.html
excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif
), but an easier way is to do a Google daterange: search by filling in a form at
www.researchbuzz.com/toolbox/goofresh.shtml or www.faganfinder.com/engines/google.shtml
. If one special syntax element is good, two must be better, right? Sometimes. Though some operators can't be mixed (you can't use the link: operator with anything else) many can be, quickly narrowing your results to a less overwhelming number.
More Google API Applications
Staggernation.com offers three tools based on the Google API. The Google API Web Search by Host (GAWSH) lists the Web hosts of the results for a given query
(www.staggernation.com/gawsh/).
When you click on the triangle next to each host, you get a list of results for that host. The Google API Relation Browsing Outliner (GARBO) is a little more complicated: You enter a URL and choose whether you want pages that related to the URL or linked to the URL
(www.staggernation.com/garbo/).
Click on the triangle next to an URL to get a list of pages linked or related to that particular URL. CapeMail is an e-mail search application that allows you to send an e-mail to google@capeclear.com with the text of your query in the subject line and get the first ten results for that query back. Maybe it's not something you'd do every day, but if your cell phone does e-mail and doesn't do Web browsing, this is a very handy address to know.

10 Fast and Security Measures

10 Fast and Free Security Enhancements PC magazine.
Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.
1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.

3. Install a free spyware blocker. Our Editors' Choice ("Spyware," April 22) was SpyBot Search & Destroy (_http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.

4. Block pop-up spam messages in Windows NT, 2000, or XP by disabling the Windows Messenger service (this is unrelated to the instant messaging program). Open Control Panel Administrative Tools Services and you'll see Messenger. Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.

5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro@l. This will make it much harder for anyone to gain access to your accounts.

6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.

7. Buy antivirus software and keep it up to date. If you're not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., w*w.grisoft.com). And doublecheck your AV with the free, online-only scanners available at w*w.pandasoftware.com/activescan and _http://housecall.trendmicro.com.

8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get. For more, check out our wireless section or see the expanded coverage in Your Unwired World in our next issue.

9. Join a respectable e-mail security list, such as the one found at our own Security Supersite at _http://security.ziffdavis.com, so that you learn about emerging threats quickly and can take proper precautions.

10. Be skeptical of things on the Internet. Don't assume that e-mail "From:" a particular person is actually from that person until you have further reason to believe it's that person. Don't assume that an attachment is what it says it is. Don't give out your password to anyone, even if that person claims to be from "support."

Paris Beautiful Buildings
















Bed Rooms Images






















Cute and smart babbies




Wednesday, September 9, 2009

All Planets

9 Planets

Saturn


Mercury
sa

Pluto


Neptune



Uranus



Venus


Mars


Jupiter

Earth

8 Wonders Of The World

COLOSSEUM

Location –IV Templum Pacis(Latin, “Temple Of Peace”)

Built in—Ist century AD

Built By/For—Vespasian, Titus

Type Of Structure--Amphitheatre


Taj mahal

Location – Agra(India)

Built in – 1653

Built by/for - Mughal Emperor Shah Jahan for Mumtaz Mahal

Type – Symbol of love




Christ Theh Redeemer

Location – Corcovado Mountain

Nearest City – Rio de janerio, Brazil

Coordinates -- 22°57′6″S 43°12′39″WCoordinates:

22°57′6″S 43°12′39″W

Establishment -- Dedicated October 12, 1931

Consecrated October 12, 2006
New Seven Wonders of the World July 7, 2007



Petra*

State Party—Jordan

Type—Cultural

Criteria—i,iii,iv

Region—Arab States

Inscription 1985 (9th Session)






















Chichen-Itza*

State Party – Mexico

Type – Cultural

Criteria – i,ii,iii

Region -- Latin America and the Caribbean

Inscription -- 1988 (12th Session



The Geat Wall Of China

State Party – China

Type – Cultural

Criteria – I,ii,iii,iv,vi

Region – Asia-Pacific

Inscription – 1987 (11th Session)



Machu Picchu*

Huayna Picchu towers above the ruins of Machu Picchu

State Party – Peru

Type – Mixed

Criteria – I,iii,vii,ix

Region -- Latin America and The Caribbean

Inscription -- 1983 (Seventh Session)