Sunday, July 5, 2009

Xbox 360 laptop



See this new creation, it has the following features:
  1. Digital pushbutton volume control rather than a clunky knob.
  2. Two user USB ports.
  3. Built-in Ethernet port, finally.
  4. Built in WIFI adapter, as usual.
  5. Flush-mount DVD door and side panels (such as the memory card slots)
  6. IR sensor for the remote control.
  7. More air holes!
  8. Jasper motherboard.

Thursday, July 2, 2009

Bollywood's Inspiration

Top directors,actors encouraging this form of plagiarism ( means illegal copying and presenting as one's own idea)

GHAJINI VS MEMENTO (2000)

Chak De! India' vs ‘Miracle’ (2004)

Krrish vs Paycheck (2003)

'Kaante' vs 'Reservoir Dogs' (1992)

'Hey Babyy' vs 'Three Men and A Baby’ (1987)

'The Train' vs ‘Derailed’ (2005)

'Ta Ra Rum Pum' vs ‘Days of Thunder’ (1990)

'Raaz' vs 'What Lies Beneath'

Aitraaz vs Disclosure (1993)

Jism vs Body Heat (1981)

Raghu Romeo3 vs Tie Me Up! Tie Me Down (1990)

Sauda: The Deal vs Indecent Proposal (1993)

Ek Ajnabee vs Man On Fire (2004)

Chocolate vs The Usual Suspects (1995)

Salaam Namaste vs Nine Months (1995)

Murder vs Unfaithful (2002)

'Mere Yaar Ki Shaadi Hai' vs 'My Best Friend's Wedding' (1997)

'Kasoor' vs 'Jagged Edge' (1985)

'Analyse This' vs 'Hum Kisise Kum Nahin'

Agni Sakshi vs Inspired by Sleeping with the Enemy (1991)

'Naksha' vs The Rundown (2003)

Mr Ya Miss vs Hot Chic (2002)

Main Aisa Hi Hoon vs I Am Sam (2001)

The Killer vs Collateral (2004)

Tathastu vs John Q (2002)

Awara Paagal Deewana vs The Whole Nine Yards (2000)

Zinda vs Oldboy

Kyon Ki... vs One Flew Over The Cuckoo's Nest (1975)

Aabra Ka Dabra vs Harry Potter (2001)

Dhoom vs The Fast and the Furious (2001)

Hum Tum vs When Harry Met Sally... (1989)



Sunday, June 28, 2009

Some Facts about Placement....

1. The average domestic salary of IIM Indore dropped from Rs 13.07 lakh in 2008 to Rs 10.29 lakh this year — a dip of 22 per cent as compared to the last year

2. The domestic average salary of IIM Calcutta took a plunge of 23 per cent from last year’s Rs 16.4 lakh to Rs 12.7 lakh this year.

3. The average domestic salary of IIM Ahmedabad has dipped by a massive 32 per cent during this year’s final placement process. The average domestic salary came down to Rs 12.17 lakh this year as compared to last year’s Rs 17.85 lakh.

Now imagine what would the dreadful situation for lower run colleges

Sunday, June 7, 2009

Update chocked by New version outburst

These days while working for Sugarlabs, i need to work on their operating system named as sugar.
For ease of my work, i installed sugar on virtual box. Sugar is "fedora" based therefore uses fedora update servers for its own files.
All those readers who are aware of fedora knows command like yum , yum install etc
for all those who are not aware
yum is used to connect to all the server worldwide and installed the required package for the user.
yesterday when i jott down "yum install git" it started checking all the server for git packages but from all the servers an http status of 403 is returned that means forbidden.

when i traced few of the server paths manually i came to know that URL which yum is trying didnt exists
e.g. it was trying to connect http://ftp.jaist.ac.in/..../11/install/... but instead of folder named as 11 they had renamed it to /11-Preview/test/... that was the first time i got frustrated by some open source policy.

For correcting this problem, i tried to poke [* way i poked is confidential *] into the system commands and found a most probable solution that works execellent for me

while installing any package traverse through the complete path of server manually and copy the path.
open the terminal
type
su
yum install
this will correct your problem
after these all steps

type yum install

your package will download itself and get install ... enjoy !!!!

Wednesday, May 20, 2009

Gtalk : are you blocked or not ??

Its being longtime, since you have chatted with one of your good friend on gtalk.
Your worry let you think that either He/She never comes online through gtalk or He/She might have blocked you.
Now there is a way to know whether you have being blocked by that person or not.
Install : Pidgin

Configure your gtalk account on pidgin, once you get all procedure done, login to yourgtalk account.In your buddy search that person, poke that person with your right click and select getinfo.
If you get the information about the person huraaay you are not blocked and if not then you really must be in a grim situation my friend

Wednesday, May 13, 2009

Change Registered Owners

One of the features which Windows doesn't have is the ability to change the owners name or the organization that the system was registered to.  A better solution to this problem is Registry hack.

This Registry hack is very simple. Remember to back up your Registry before you make any changes to it. A Registry with errors can cause your system to run slow, crash, or even not boot at all.

1. Go to Start and search for regedit. Windows XP users will have to go to Start, Run and type in regedit then click okay.


2. Expand the following on the left menu tree:
H_Key_Local_Machine
Software
Microsoft
Current Version


3. On the right you should see a registry key that is called RegisteredOwner. Double click this key and you can change it’s value. This will change the owner’s name.


4. If you want you can also change RegisteredOrganization also. You will double click the key like you did RegisteredOwner and change the value.


5. Close your Registry

To check the if the changes have taken place, you can run Winver from a Run prompt or in Vista you can search for this application.


Sunday, May 3, 2009

Much awaited office 2010

Earlier this year in January, I posted few pics of office 14 (code name) given to office 2010.Now presently office 2010 comes under black box testing stage and microsoft is planing to release it with windows se7en

Few pics of office 2010











Fre@k

Thursday, April 16, 2009

How to read and write NTFS partitions while using boot camp on MAC OS X Leopard

Users running Mac OS X with Bootcamp Windows may struggle to modify or update your documents and files in the Windows partition - usually it is in NTFS File System format which you can read the drive natively in Mac OS X but not write onto it.

Recently Amit Singh, a Google employee, releases a implementation called MacFUSE which makes it possible to use any FUSE (File-system in USErspace) file systems in Mac. And the most useful FUSE is the NTFS-3G Read/Write Driver, which ables system to load NTFS with read and write capability. This is truly the greatest news for dual booting Mac OS X and Windows XP or Vista.

Without going into great deal of technical details and compilation of the source code, I found out users around Internet already came up with binary version (in DMG) of MacFUSE and ntfs-3g, ready to install (credit to ShadowOfGed at AppleNova). Here are the instructions on how to use MacFUSE and NTFS-3G. It does require a little of administration skills as it involves running commands in the Terminal.

MacFUSE/NTFS-3G works for me, but as this is an experimental software, so back up your data, and try it at your own risk.

Sunday, April 12, 2009

Is your computer infected by Conficker??

The worm, Conficker, has infected millions of PCs all over the world and has turned into a nightmare for security experts. But here's a site developed by people at University of Bonn that lets you know whether your computer is infected by the worm just by visiting the site. Click here for the link.


Play CS through HAMACHI

This is a tutorial on how to play Counter Strike online with your friends using the Hamachi software.


1.Download hamachi by going to:https://secure.logmein.com/products/hamachi/list.asp
(Only 989 Kb)

To host a Counter Strike game:
1. Turn off or disable your firewall when you play using hamachi. If you are using the Windows firewall, remember to turn it off from the Control Panel.

If turning off firewall doesn’t work, try setting exceptions for ‘Half Life Launcher’ from within the firewall program.

2. Run Hamachi. Click the last button and choose Preferences. Then click Window and check the Show “Advanced…” peer menu item checkbox and click OK.

3. For every new player who joins your networks you have to do the following steps:
A. Right click the player’s entry in Hamachi
B. Click Advanced.
C. In the Peer VPN alias box enter the first three parts of your Hamachi IP address (example: 5.46.80) and add the last part of the player’s IP address ( example: .190) so that it makes a new IP address.
D. Click OK and then exit Hamachi. Launch Hamachi again.

4. Launch the game. Click Create New Multiplayer Game option and start the game. Other players can connect to you as long as you have set an alias for each of them.

To join a CS CZ game:

1. Download and install Hamachi. The free version is only needed.
2. Run Hamachi and click the Create or join networks button and choose Join existing network.

3. Enter the username and password of the network you want to join.

4. Turn off your firewall (or disable it). Remember to turn it back on after you finish playing.


5. Run CS.

6. Press the ~ key on the keyboard. It is to the left of the 1 key on the top row of the keyboard.

7. Type connect 5.40.30.122 to connect if I am hosting the game. If someone else is hosting the game look at their Hamachi IP address and use that instead of mine.Or you can type the hamachi name instead of the ip address

8. The game will connect and you can start playing.

Errors:
If you get a Class C error, the host has not set up Hamachi aliases correctly. Ask the host to read the section below. If you cannot connect to the game for any other reason it’s a problem with your firewall. Else open CS console and type "ip (your HAMACHI ip address)".

Sunday, March 29, 2009

Voice Over : New feature of Ipod Shuffle

Voice Over is latest stunning feature of new ipod shuffle.
The above mentioned feature makes ipod as the first music player that talks to you.
with a press of button voice over tells you about the artist, genre and various other features of the song without interupting your listening.



Saturday, March 28, 2009

Fastest Web Browser


Evil Science has published Internet Explorer vs Firefox vs Opera vs Chrome vs Safari, which contains the results of an extensive competitive speed test between five popular web browsers.

The author is an Opera user who discovered that his favorite browser has slipped to the #2 spot for performance.

The author rates each browser in nine different categories. The final totals are given above...

To read full report click here 



Tuesday, March 24, 2009

Alienware Area-51 m15x VS MacBook PRO

Two giant PC makers are battling for the title “best PC ever built” It’s really hard to decide who’s winning for these two giant competitors has their own killing machine for the user. However, I manage to compare their top-notch notebook and you decide who deserve to bring home the title.

Let’s start with Alienware Area-51 m15x. If you love sci-fi movie then this notebook is definitely right for you, “kidding!”. Personally I love watching sci-fi movie specially if Aliens are involve :D. (enough silly talk). This model from Alienware the Area-51 m15x was release in November 2007. Inside of this amazing notebook lies a powerful Intel Core™ 2 Extreme the first 15′4″ notebook to have this technology. It come’s with NVIDIA® GeForce™ 8800M GTX for brilliant gaming experience memory is upgradeable up to 4gigz “thats a lot of RAM” and also I like the Idea of illuminated keyboard and scroll pad. So basically if you like windows application, an avid windows XP or above user, full 3D (human likeness) games and looking for a powerhouse laptop that will knock ordinary laptop then this notebook is right for you. In the contrary, Area-51 m15x has found his match the MacBook PRO.

Now let’s discuss about MacBook PRO and why so many PC users are so tune to it, well probably of the slick and elegant design, MacBook were loved since it went out on the market and every year MacBook will release new model and cool design. Beside of it’s slickness and elegant design Apple has their own standard Operating System the MacOS, and probably the best Operating System out in the market. “Okay enough phrases on the design what matter’s most is the inside”. So let’s examine deep inside and what powers MacOS to operate. MacBook uses a 2.6GHz Intel Core™ 2 Duo known as one of the fastest CPU on the planet buddle with NVIDIA GeForce 8600M GT enough to play you favorite 3D games. MacBook is not design for gamers unlike it’s rival competitor. MacBook is ideal for Web Designer like me, Video Editing and other multimedia stuff, I would give MacBook 3 thumbs up for it.


So there you have it, You decide which is better than the other, If you ask me I like them both and I cannot decide with one is better because in term of used they satisfy me a lot.

Thursday, March 19, 2009

Google Chrome Playing Tricks with Beta

They took beta tag off from Google Chrome last december.
Now this time they have start distributing their own Google chrome in two versions
1. Stable Chrome.
2. Developer Chrome.

They are re-introducing beta channel for early feedback.
Check the graphs which they published as the comparison between their own products.




These graphs clearly shows that this beta version is 25 % more faster then their earlier versions.
Some of the new features you can try out include form autofill, full page zoom and autoscroll and a cool new way to drag tabs out to get a side-by-side view.

Tuesday, March 17, 2009

Opera: The True Browser Star

A browser prodigy, when Opera debuted in 1995 it could open multiple documents in a single browser window, a precursor of what are now tabs, which it added in 2000. No prima donna, its demands are modest.

When it comes to features, Opera has always been a trailblazer, leaving Firefox and IE to play catch-up. For example, today's Firefox 2 saves your session in the event of a crash, so you can pick up where you left off when you recover. And you can save a group of tabs as a bookmark -- a feature that's new in both Firefox 2 and IE7.

Guess what? Opera pioneered these features back in Version 7, which was released in 2003. Crash or prematurely close Opera and it's no loss, just relaunch for an instant encore. You can also save your browsing sessions under the File menu on the menu bar. And in Version 8, Opera added a trash can icon to the page bar where closed tabs and blocked pop-ups are saved, just in case you need them.

Opera continues to lead the way with every major upgrade. Version 9 introduced thumbnail previews, which make it easy to find your way among multiple tabs -- just hover your mouse over any tab to see a thumbnail image of the Web page. Also new is the content blocker. See something you don't like on a Web page -- an ad or an offensive image, for example? Just right-click and choose "Block content" to make it disappear. Opera remembers your choice, so the next time you visit that page the content remains blocked.

Opera 9 also incorporates Widgets, small Internet applets that run directly on your desktop and can be saved on your system for quick future access. There are games, newsfeeds, reference tools, image tools -- even a text editor. Mac OS X, Windows Vista and Yahoo have similar offerings, but the beauty of Opera's Widgets is that you can run them directly from the browser without having to have a Mac or get Vista or download Yahoo's Widget Engine.

Still in a light mood .....

continuing with my previous post, here are some more questions :

[1] IF YOU HAVE SEX WITH A PROSTITUTE AGAINST HER WILL, IS IT CONSIDERED RAPE OR SHOPLIFTING?

[2] CAN YOU CRY UNDER WATER? 

[3] HOW IMPORTANT DOES A PERSON HAVE TO BE BEFORE THEY ARE CONSIDERED ASSASSINATED INSTEAD OF JUST MURDERED? 

[4] WHY DO YOU HAVE TO "PUT YOUR TWO CENTS IN"... BUT IT'S ONLY A "PENNY FOR YOUR THOUGHTS"? WHERE'S THAT EXTRA PENNY GOING TO? 

[5] ONCE YOU'RE IN HEAVEN, DO YOU GET STUCK WEARING THE CLOTHES YOU WERE BURIED IN FOR ETERNITY? 

[6] WHY DOES A ROUND PIZZA COME IN A SQUARE BOX?  

[7] WHAT DISEASE DID CURED HAM ACTUALLY HAVE? 

[8] HOW IS IT THAT WE PUT MAN ON THE MOON BEFORE WE FIGURED OUT IT WOULD BE A GOOD IDEA TO PUT WHEELS ON LUGGAGE? 

[9] WHY IS IT THAT PEOPLE SAY THEY "SLEPT LIKE A BABY" WHEN BABIES WAKE UP LIKE EVERY TWO HOURS? 

[10] IF A DEAF PERSON HAS TO GO TO COURT, IS IT STILL CALLED A HEARING? 

[11] WHY ARE YOU IN A MOVIE, BUT YOU'RE ON TV? 

[12] WHY DO PEOPLE PAY TO GO UP TALL BUILDINGS AND THEN PUT MONEY IN BINOCULARS TO LOOK AT THINGS ON THE GROUND?

[13] WHY DO DOCTORS LEAVE THE ROOM WHILE YOU CHANGE? THEY'RE GOING TO SEE YOU NAKED ANYWAY. 

[14] WHY IS "BRA" SINGULAR AND "PANTIES" PLURAL?

[15] WHY DO TOASTERS ALWAYS HAVE A SETTING THAT BURNS THE TOAST TO A HORRIBLE CRISP, WHICH NO DECENT HUMAN BEING WOULD EAT? 

[16] IF JIMMY CRACKS CORN AND NO ONE CARES, WHY IS THERE A STUPID SONG ABOUT HIM? 

[17] CAN A HEARSE CARRYING A CORPSE DRIVE IN THE CARPOOL LANE ? 

[18] IF THE PROFESSOR ON GILLIGAN'S ISLAND CAN MAKE A RADIO OUT OF A COCONUT, WHY CAN'T HE FIX A HOLE IN A BOAT? 

[19] WHY DOES GOOFY STAND ERECT WHILE PLUTO REMAINS ON ALL FOURS? THEY'RE BOTH DOGS! 

[20] IF WILE E. COYOTE HAD ENOUGH MONEY TO BUY ALL THAT ACME CRAP, WHY DIDN'T HE JUST BUY DINNER? 

[21] IF CORN OIL IS MADE FROM CORN, AND VEGETABLE OIL IS MADE FROM VEGETABLES, WHAT IS BABY OIL MADE FROM? 

[22] IF ELECTRICITY COMES FROM ELECTRONS, DOES MORALITY COME FROM MORONS? 

[23] DO THE ALPHABET SONG AND TWINKLE, TWINKLE LITTLE STAR HAVE THE SAME TUNE? 

[24] WHY DID YOU JUST TRY SINGING THE TWO SONGS ABOVE? 

[25] WHY DO THEY CALL IT AN ASTEROID WHEN IT'S OUTSIDE THE HEMISPHERE, BUT CALL IT A HEMORRHOID WHEN IT'S IN YOUR BUTT? 

[26] DID YOU EVER NOTICE THAT WHEN YOU BLOW IN A DOG'S FACE, HE GETS MAD AT YOU, BUT WHEN YOU TAKE HIM FOR A CAR RIDE, HE STICKS HIS HEAD OUT THE WINDOW? 

Monday, March 16, 2009

On a Lighter note.....

Part of being a Geek, is that u are very very curious. Here are some questions that spring into my mind :-

WHY (can anyone give the answers)

1. Why do we press harder on a remote control when we know the batteries are getting dead?

2. Why do banks charge a fee on "insufficient funds" when they know there is not enough money?

3. Why does someone believe you when you say there are four billion stars, but check when you say the paint is wet?

4. Why doesn't glue stick to the bottle? 

5. Why do they use sterilized needles for death by lethal injection?

6. Why doesn't Tarzan have a beard?

7. Why does Superman stop bullets with his chest, but ducks when you throw a revolver at him? 

8. Why do Kamikaze pilots wear helmets?

9. Whose idea was it to put an "S" in the word "lips"?

10. If people evolved from apes, why are there still apes?

11. Why is it that no matter what color bubble bath you use the bubbles are always white?

12. Is there ever a day that mattresses are not on sale?

13. Why do people constantly return to the refrigerator with hopes that something new to eat will have materialized?

14. Why do people keep running over a string a dozen times with their vacuum cleaner, then reach down, pick it up, examine it, then put it down to give the vacuum one more chance?

15 Why is it that no plastic bag will open from the end on your first try?

16. How do those dead bugs get into those enclosed light fixtures? 

17. When we are in the supermarket and someone rams our ankle with a shopping cart then apologizes for doing so, why do we say, "It's all right?" Well, it isn't all right, so why don't we say, "That hurt, you stupid idiot?"

18. Why is it that whenever you attempt to catch something that's falling off the table you always manage to knock something else over?

19. In Winter, why do we try to keep the house as warm as it was in Summer, when we complained about the heat in Summer?

20. How come you never hear father-in-law jokes?

Friday, March 13, 2009

Opera Turbo

Today, Opera launched a limited test phase for Opera Turbo.
 
Opera Turbo is a server-side optimization and compression technology that provides significant improvements in browsing speeds over limited-bandwidth connections by compressing network traffic. This does not only make you surf faster, but also lowers the cost of browsing when you are on a pay per usage plan. It compresses network traffic by upto 80%!!!

Technology: How Opera Turbo works

Opera Turbo uses advanced compression technology to speed up data transfer and to reduce the amount of data that needs to be downloaded. By leveraging its experience with server-side optimization solutions such as Opera Mini, Opera Software is extending optimization to encompass other Opera browser products.






You can download the test version of Opera turbo from http://labs.opera.com/downloads/

Tuesday, March 10, 2009

Apple's new netbook??


There are strong rumours doing the rounds that Apple is entering the lucrative netbook market. The shipment of the netbook could start as soon as the 3rd quarter of this year!!! Though everybody at Apple is in denial mode about the rumoured product... but IF the product indeed comes out, it could look something like this : 




OR



Monday, March 9, 2009

If Airlines Were Based on Operating Systems

UNIX Airways

Everyone brings one piece of the plane along when they come to the airport. They all go out on the runway and put the plane together piece by piece, arguing nonstop about what kind of plane they are supposed to be building.


***********

Air DOS

Everybody pushes the airplane until it glides, then they jump on and let the plane coast until it hits the ground again. Then they push again, jump on again, and so on.


***********



Mac Airlines

All the stewards, captains, baggage handlers, and ticket agents look and act exactly the same. Every time you ask questions about details, you are gently but firmly told that you don't need to know, don't want to know, and everything will be done for you without your ever having to know, so just shut up.


***********

Windows Air

The terminal is pretty and colorful, with friendly stewards, easy baggage check and boarding, and a smooth takeoff. After about 10 minutes in the air, the plane explodes with no warning whatsoever.


***********

Windows NT Air

Just like Windows Air, but costs more, uses much bigger planes, and takes out all the other aircraft within a 40-mile radius when it explodes.


***********

Linux Air

Disgruntled employees of all the other OS airlines decide to start their own airline. They build the planes and ticket counters, and pave the runways themselves.
They charge a small fee to cover the cost of printing the ticket, but you can also download and print the ticket yourself. When you board the plane, you are given a seat, four bolts, a wrench, and a copy of the seat-HOWTO.html.
Once settled, the fully adjustable seat is very comfortable, the plane leaves and arrives on time without a single problem, the in-flight meal is wonderful. You try to tell customers of the other airlines about the great trip, but all they can say is, "You had to do what with the seat?"

Sunday, March 1, 2009

Keyboard Shortcuts, must read ....

Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. You can use the following keyboard shortcuts :

Windows key + E = Explorer

ALT + Tab = Switch between windows

ALT, Space, X = Maximize window

CTRL + Shift + Esc = Task Manager

Windows key + Break = System properties

Windows key + F = Search

Windows key + D = Hide/Display all windows

CTRL + C = copy

CTRL + X = cut

CTRL + V = paste

[Alt] and [Esc] Switch between running applications

[Alt] and letter Select menu item by underlined letter

[Ctrl] and [Esc] Open Program Menu

[Ctrl] and [F4] Close active document or group windows (does not work with some applications)

[Alt] and [F4] Quit active application or close current window

[Alt] and [-] Open Control menu for active document

Ctrl] Lft., Rt. arrow Move cursor forward or back one word

Ctrl] Up, Down arrow Move cursor forward or back one paragraph

[F1] Open Help for active application

Windows+M Minimize all open windows

Shift+Windows+M Undo minimize all open windows

Windows+F1 Open Windows Help

BIOS Beep Codes

When a computer is first turned on, or rebooted, its BIOS performs a power-on self test (POST) to test the system's hardware, checking to make sure that all of the system's hardware components are working properly. Under normal circumstances, the POST will display an error message; however, if the BIOS detects an error before it can access the video card, or if there is a problem with the video card, it will produce a series of beeps, and the pattern of the beeps indicates what kind of problem the BIOS has detected.
Because there are many brands of BIOS, there are no standard beep codes for every BIOS.

The two most-used brands are AMI (American Megatrends International) and Phoenix.

AMI Beep Codes

1 beep - DRAM refresh failure. There is a problem in the system memory or the motherboard.
2 beeps - Memory parity error. The parity circuit is not working properly.
3 beeps - Base 64K RAM failure. There is a problem with the first 64K of system memory.
4 beeps - System timer not operational. There is problem with the timer(s) that control functions on the motherboard.
5 beeps - Processor failure. The system CPU has failed.
6 beeps - Gate A20/keyboard controller failure. The keyboard IC controller has failed, preventing gate A20 from switching the processor to protect mode.
7 beeps - Virtual mode exception error.
8 beeps - Video memory error. The BIOS cannot write to the frame buffer memory on the video card.
9 beeps - ROM checksum error. The BIOS ROM chip on the motherboard is likely faulty.
10 beeps - CMOS checksum error. Something on the motherboard is causing an error when trying to interact with the CMOS.
11 beeps - Bad cache memory. An error in the level 2 cache memory.
1 long beep, 2 short - Failure in the video system.
1 long beep, 3 short - A failure has been detected in memory above 64K.
1 long beep, 8 short - Display test failure.
Continuous beeping - A problem with the memory or video.

Thursday, February 26, 2009

Windows 7 shipping this Fall... according to Compal, anyway

While Steve Ballmer himself declared that Windows Mobile 7 would be coming out next year, we've got a somewhat less reliable source suggesting that the desktop version of Win7 will be landing this fall. Ray Chen, president of Taipei-based Compal Electronics, was quoted as saying that "according to current planning," Windows 7 should be on its machines by "late September or early October." For those unaware, Compal is responsible for crafting HP and Acer laptops, and honestly, we're not exactly sure how this bigwig secured these dates. Of course, it stands to reason that everyone else in the industry is either 1) clueless or 2) just better at keeping secrets. For what it's worth, we're taking this with a huge spoon of salt, and just between us, you should probably do the same.

Monday, February 23, 2009

GTALK + F.M. RADIO

Listening online FM is easy. All you need is to use GTalk. Though you can use it via other messenger too but here we will talk about gTalk only.
Listen online FM free (FM on Computer) Hindi, english, punjabi and lots more fm channel / radio station

This is done using Gtalk2Voip, it is a free and publicly open voice gateway for major Instant Messenger clients.

Steps to listen to any channel listed below:

1. Sign in your Google Talk application.
2. Add this ID in your Google Talk service@gtalk2voip.com, when you will first add then you will get following screen with some welcome messages.
Google Talk
3. Now add another ID with radio station ID 110@radio.gtalk2voip.com Here 110 is ID for hindi FM station Teen Taal.
4. Now make call to 110@radio.gtalk2voip.com, once connected enjoy hindi songs are random. Once connected you will listen music in few seconds.
FM online using Gtalk

Similarly you can add other channels too, all you need is to add ChannelNumber@radio.gtalk2voip.com.

LIST OF AVAILABLE RADIO STATIONS / Channels:
100 - 181.fm - Kickin’ Country (Todays Best Country!), http://scfire-chi0l-1.stream.aol.com:80/stream/1075
101 - 1.FM - Country, http://64.62.194.11:8020/
102 - Atlantic Sound Factory - ASF Radio, http://69.31.50.146:80/
103 - 100.7 Jack FM, San Diego, http://38.116.132.31:9024/
104 - 102.7 FM The Fringe, http://64.72.124.89:8134/
105 - 181.fm - The Buzz (Your Alternative Station!), http://scfire-nyk0l-1.stream.aol.com:80/stream/1022
106 - 181.fm - The Mix Channel (70s, 80s, 90s and Today’s Best Music) , http://208.53.158.167:8032/
107 - 181.fm - The Eagle (Your Home For REAL Classic Rock!), http://208.53.158.126:8030/
108 - .977 The 80s Channel, http://scfire-ntc0l-2.stream.aol.com:80/stream/1040
109 - 1.FM - Channel X, http://209.51.161.54:8072/
110- Teen Taal Radio (HINDI), http://213.251.129.40:8022/
111 - Radio Helsinki - 92.6 MHz, http://88.198.49.11:8000/live56.ogg
201 - KCRW World News, http://scfire-ntc0l-2.stream.aol.com:80/stream/1047
202 - Sporting News Radio, http://scfire-chi0l-2.stream.aol.com:80/stream/1057
203 - KPFK - Southern California’s 90.7 FM News, Talk & Music, http://64.27.31.66:80/
204 - WBUR 90.9 FM, Boston’s NPR News Station, http://205.234.188.21:80/

Sunday, February 22, 2009

Average GMAT scores.....


The average and median GMAT scores for some of the top  business schools ..... [clk on the image to zoom]


Saturday, February 21, 2009

Geekiest Math Clock


If you are good at notations and mathematical jazz, I am sure you would love to flaunt this clock and perhaps your skills at numbers too. Well, if this were the geekiest math clock you have ever seen in your life.

Explanation of the clock numerals
1 Legendre's constant  
2 "An infinite number of mathematicians..."  
3 A Unicode character XML "numeric character reference"  
4 Modular arithmetic  
5 The Golden Mean reworked a little  
6 Three Factorial (3*2*1)  
7 6.99999.. Though a different number than 7, still equals 7  
8 Graphical representation of Binary code  
9 An example of a base-4 number  
10 A Binomial Coefficient 
11 An example of Hexadecimal encoding  
12 The cube root is the inverse of 12^3 

Lost city of atlantis found on google earth ??

Monday, February 16, 2009

SMS Lingo

With only 160 characters per text message here's a list of abbreviations you will find useful and a lot more fun. Try sending these to your freinds on their Mobiles and have unlimited fun!!!!!!!!!!!!!!!!!!!!!!!!

AFAIK: As Far As I Know 
AFK: Away From Keyboard 
ASAP: As Soon As Possible 
ATK: At The Keyboard 
ATM: At The Moment 
A3: Anytime, Anywhere, Anyplace 
BAK: Back At Keyboard 
BBL: Be Back Later 
BBS: Be Back Soon 
BFN/B4N: Bye For Now 
BRB: Be Right Back 
BRT: Be Right There 
BTW: By The Way 
B4N: Bye For Now 
CU: See You 
CUL8R: See You Later 
CYA: See You 
FAQ: Frequently Asked Questions 
FC: Fingers Crossed 
FWIW: For What It's Worth 
FYI: For Your Information 
GAL: Get A Life 
GG: Good Game 
GMTA: Great Minds Think Alike 
GR8: Great! 
G9: Genius 
IC: I See 
ICQ: I Seek you 
ILU: I Love You 
IMHO: In My Honest/Humble Opinion 
IMO: In My Opinion 
IOW: In Other Words 
IRL: In Real Life 
KISS: Keep It Simple, Stupid 
LDR: Long Distance Relationship 
LMAO: Laugh My Ass Off 
LOL: Laughing Out Loud 
LTNS: Long Time No See 
L8R: Later 
MTE: My Thoughts Exactly 
M8: Mate 
NRN: No Reply Necessary 
OIC: Oh I See 
PITA: Pain In The A*8 
PRT: Party 
PRW: Parents Are Watching 
QPSA? Que Pasa? 
ROFL: Rolling On The Floor Laughing 
ROFLOL: Rolling On The Floor Laughing Out Loud 
ROTFLMAO: Rolling On The Floor Laughing My A** Off 
SK8: Skate 
STATS: Your sex and age 
ASL: Age, Sex, Location 
THX: Thank You 
TTFN: Ta-Ta For Now! 
TTYL: Talk To You Later 
U: You 
U2: You Too 
U4E: Yours For Ever 
WB: Welcome Back 
WTF: What The F... 
WTG: Way To Go! 
WUF: Where Are You From? 
W8: Wait... 
7K: Sick

Tuesday, February 10, 2009

100th POST

Yipeeee!!!
I raise this toast to celebrate our 100th blog post.
I warmly congratulate all Geeks as we have reached a milestone which most Blogs can only Dream of..
andddd plzzzz
I don't want to receive any request of GRAVITY or somewhere else.. as i know you people go wild with a little spark only... [:)]

Web history

With Web History service on google, you'll be able to:

View and manage your web activity.
You know that great web site you saw online and now can't find? From now on, you can. With Web History, you can view and search across the full text of the pages you've visited, including Google searches, web pages, images, videos and news stories. You can also manage your web activity and remove items from your web history at any time.

Get the search results most relevant to you.
Web History helps deliver more personalized search results based on the things you've searched for on Google and the sites you've visited. You might not notice a big impact on your search results early on, but they should steadily improve over time the more you use Web History.

Follow interesting trends in your web activity.
Which sites do you visit frequently? How many searches did you do between 10 a.m. and 2 p.m.? Web History can tell you about these and other interesting trends in your web activity

but remember to get all your history, you just need to search google after login into your gmail account.

-->Fre@k

Monday, February 9, 2009

Difference b/w Notebooks and Netbooks




Notebook, or laptop, is a portable computer that normally have :
Screen size : 12 Inch and up
Processor : Intel Pentium Dual-Core,Core 2 Duo or AMD Turion X2
Graphics : Integrated or External Graphic Card, from Intel GMA x3100 to AMD Mobility HD 3870X2
Weight : 1.9kg and up

Netbook, a smaller variant of notebook, 1st poineered by Asus with their release of Asus Eee PC 700,and now laptop companies such as Acer and MSI released their own netbooks (Acer aspire one and MSI wind respectively), have :
Screen size : 12 Inch max
Processor : VIA C7 1.2GHz, Intel Atom N270 1.6GHz or AMD Geode 800MHz
Graphics : Integrated Graphic Card, mostly Intel GMA 900 or 950
Weight : 1.1kg and below


While netbooks will take you onto the Internet, they won't replace notebook computers, since they lack the processing power to create media and handle advanced graphics and video—and they will not allow you to multitask. Netbooks are low-cost and highly portable, but they're designed for one task at a time.

Win XP Tip - Hidden Back-up utility

>> Insert your windows XP disc into your PC.
>> Click exit if your installation screen comes up.
>> Now go too your CD drive in *My Computer*. Right-click and select open.
>> Choose VALUE ADD\MSFT\NT BACK-UP FILE.
>> In the *files of type* drop down list be sure that *select all files* is on.
>> Click on the NTBACK-UP.msi file and click okay.
>> Click the finish button and now go over too the start button\ALL PROGRAMS\ACCESSORIES\SYSTEM TOOLS\ and there it is now.. BACK-UP FILES...

Great little tool that Microsoft never should have hidden.

Sunday, February 8, 2009

Wednesday, February 4, 2009

How Much Bandwidth Is Enough?

BandWidth Explained

Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.

Hosting Bandwidth

Each time you visit a website, you are creating traffic, because in order to view that web page on your computer, the web page is first downloaded to your computer (between the web site and you) which is then displayed using your browser software (Internet Explorer, Netscape, etc.) . The page itself is simply a file that creates traffic.

A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for CNN.com is about 200KB (200 Kilobytes = 200,000 bytes = 1,600,000 bits). This is typically large for a web page. In comparison, Yahoo's home page is about 70KB.

How Much Bandwidth Is Enough?

It depends (don't you hate that answer). But in truth, it does. Since bandwidth is a significant determinant of hosting plan prices, you should take time to determine just how much is right for you. Almost all hosting plans have bandwidth requirements measured in months, so you need to estimate the amount of bandwidth that will be required by your site on a monthly basis.

If you do not intend to provide file download capability from your site, the formula for calculating bandwidth is fairly straightforward:

Average Daily Visitors x Average Page Views x Average Page Size x 31 x Fudge Factor

If you intend to allow people to download files from your site, your bandwidth calculation should be:

[(Average Daily Visitors x Average Page Views x Average Page Size) +
(Average Daily File Downloads x Average File Size)] x 31 x Fudge Factor

Let us examine each item in the formula:

Average Daily Visitors - The number of people you expect to visit your site, on average, each day. Depending upon how you market your site, this number could be from 1 to 1,000,000.

Average Page Views - On average, the number of web pages you expect a person to view. If you have 50 web pages in our web site, an average person may only view 5 of those pages each time they visit.

Average Page Size - The average size of your web pages, in Kilobytes (KB). If you have already designed your site, you can calculate this directly.

Average Daily File Downloads - The number of downloads you expect to occur on your site. This is a function of the numbers of visitors and how many times a visitor downloads a file, on average, each day.

Average File Size - Average file size of files that are downloadable from your site. Similar to your web pages, if you already know which files can be downloaded, you can calculate this directly.

Fudge Factor - A number greater than 1. Using 1.5 would be safe, which assumes that your estimate is off by 50%. 

However, if you were very unsure, you could use 2 or 3 to ensure that your bandwidth requirements are more than met.

Usually, hosting plans offer bandwidth in terms of Gigabytes (GB) per month. This is why our formula takes daily averages and multiplies them by 31.

Summary

Most personal or small business sites will not need more than 1GB of bandwidth per month. If you have a web site that is composed of static web pages and you expect little traffic to your site on a daily basis, go with a low bandwidth plan. 

If you go over the amount of bandwidth allocated in your plan, your hosting company could charge you over usage fees, so if you think the traffic to your site will be significant, you may want to go through the calculations above to estimate the amount of bandwidth required in a hosting plan.

Tuesday, January 27, 2009

Ubuntu 9.4 Alpha 3 Available

The Ubuntu developers are moving quickly to bring you the absolute latest and greatest software the Open Source Community has to offer. The Jaunty Jackalope Alpha 3 will be the third alpha release of Ubuntu 9.04, bringing with it the earliest new features for the next version of Ubuntu.

Highlights of this version are: updated packages, X.Org server version 1.6, a new style for notifications and notification preferences, Linux kernel version 2.6.28, and ext4 installation support.

Note that this is an alpha release and should therefore not be installed on production machines. The final stable version is expected on April 23, 2009.

Tuesday, January 20, 2009

Bootable Floppy disk

A boot disk is a floppy disk that contains, at the very least, an operating system. Boot disks are useful in case of a hard drive failure. With a boot disk, you can place a floppy disk in your computer [if you still have a floppy drive]when it boots up and still have access to your computer.

While I highly recommend putting more than just the basic operating system on a boot disk, such as useful batch files, useful commands, device drivers, etc., the following line *will* make a floppy disk bootable:

SYS C: A:

Monday, January 19, 2009

Changing file extensions in windows XP

Sometimes it may be necessary to change the file extension to open the file or files with a different application or in a different method. Here's the procedure : 

  1. Go to the Tools menu.
  2. Select Folder Options.
  3. In the 'View' tab, uncheck the option "Hide extensions for known file types" and apply.


  4. Now rename the file by replacing the existing extension with the one you need.

Sunday, January 18, 2009

Certified Ethical Hacking [CEH]

Certified Ethical Hacking is for an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a hacker. Illegal hacking (ie; cracking computer systems) is a felony in the United States and most other countries. But when this type of hacking is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target.

Certified Ethical Hacking is for skilled professionals who understand and know how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

Certification is achieved through training at an ATC (Accredited Training Center) or self-study. If students choose to self-study, in order to sit for the exam they must fill out an application and also have documented 2 years of information security work experience. Both CEH v4 and v5 utilize EC-Council's exam 312-50. The exam consists of 125 (v4) or 150 (v5) multiple-choice questions, and students are given up to three or four hours, respectively, to complete the examination. The exam costs US$250, and is administered via computer at an EC-Council Accredited Training Center, Pearson VUE, or Prometric testing center (in the United States)

Saturday, January 17, 2009

Steps to follow to dry your Cellphones

If you’ve dropped your cell phone in water, or just gotten it wet, then you’ll want to make sure you follow a series of steps to ensure it will continue to operate.

1. Do not, repeat, DO NOT try to suck water from any device with a vacuum cleaner that is not designed to suck water. What where you thinking? This could cause a fire hazard, and could electrocute you! Only use a “wet/dry vac to do this as it is designed to work with wet liquids”
2. You have to pull the battery first thing!!! Not in a few min, but the sec you pull the device from the water. This will help prevent shorting of the device.
3. Letting a phone or any other device like it sit and dry on it’s own will cause corrosion of the electronic and at that point, you should get a new one.
So, how do you recover a wet cell phone? This is your best bet. Oh, and how do I know what I’m talking about? I have re-coved high tech electronics that have been submersed in water about a hundred times and I work with R/C subs and boats modified with things like cameras and other high tech electronics that are designed to sink and be recovered, and as much as you like to try, you can’t always keep it water proof. Note: I have only lost two items I could not get to work again out of about 100 + sinks.
So on to the recovery:

1. Remove the power ASAP. Pull that Battery!!!
2. Pull the sim card “if you have one!”
3. Pour rubbing alcohol in to the device. Fill it or submerse the device in a bowl full of the alcohol and try to get out all the bubbles. Why rubbing alcohol? The alcohol displaces the water from the circuit boards.
4. Soak the phone for just a few seconds to get it all in there. Now take the device and drain the alcohol from it. Shake it a bit to get as much of the liquid out as you can. You can also use air in a can to gently blow it out.
5. Alcohol will evaporate on it’s own in a short amount of time. I often will continue to shake the item and inspect it to make sure it is dry. Note, sometimes you will have liquid in the LCD and this can be tricky trying to get it out, if the alcohol can displace it, it will help.
6. Let sit for several hours to make sure it is very dry.
7. Put the battery back in and see what happens. I have on my own recovered several phones for friends this way but this will only work, if it is done right after you pull the phone from the water. If you wait, corrosion will set in and the phone is most likely done fore.

SHIFT, CAPSLOCK, and CONTROL keys stop working in Ubuntu

About once a week, my , , and keys stop working. This is an Ubuntu issue, not a hardware issue. This issue has been recurring through several point releases of Ubuntu.

I was rebooting every time this issue occurred; that was a serious annoyance. Now, however, I have a much better fix.
The command `setxkbmap` resets the keyboard map and resolves the issue without a reboot.

I hope that this bug is eventually found and fixed, but now it’s reduced from a major annoyance to a very minor issue.


Office 14 -- Successor of office 2007

Catch the glimpse of not so hyped secretive project of Microsoft on OFFICE 14 -- successor of office 2007






Wednesday, January 14, 2009

SHUT DOWN PC FASTER

  1. Start 
  2. Run
  3. Type-Regedit.
  4. Navigate to HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control.
  5. Click on the "Control" Folder.
  6. Select "WaitToKillServiceTimeout"
  7. Right click on it and select Modify.
  8. Set it a value lower than 2000.

Thats it guys and see the difference when you shut down your PC.

Sunday, January 11, 2009

Activate Automatic Login on WinXP


If you’re sick of having to click a button or enter a password every time WinXP boots up.Here’s a quick and easy way to eliminate this step. It involves editing the Windows registry, though, so you must be careful to follow these directions exactly.


Step1: Click the Start button and select Run. Type “regedit” in the field and click OK.

Step2: Browse to the registry key titled   “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon.”

Step3: Double click DefaultUserName and enter your account name. Click OK. Then double click     DefaultPassword, enter your current password and click OK. If DefaultPassword does not 
               appear, create the value by clicking the Edit menu, selecting New and then selecting 
               String  Value. Name the value as DefaultPassword. Once it’s created, double click Default 
               Password  and enter your choosen password.

Step4: Double click AutoAdminLogon and enter “1” in the Value Data box. Click OK. If 
                AutoAdminLogon does  not appear, create it using the same  method in the step
                above and set the value as 1.

Step5: Close the Registry Editor and reboot your computer. You should 
                log  into  Windows automatically.

Bimmy (Sonumour@gmail.com)

Problem in opening the drive in a single window on double-click in WinXP

I had encountered such type of problem many a times.As for me  the expected behaviour is that each drive opens in the same window until a user has explicitly set the option Open Each Folder In Its Own Window.
Under File menu >> Tools >> Folder Options in General.

Why It is that drive opens in new window?

It happens when a program or virus tries to edit the File Folder or Drive shell entries to add more context menu items and set them as default for double click action.
Lets see how we can fix this.

Fix:

First Method:
1. Open Start >> Run and type regsvr32 /i shell32.dll
2. press ok
3. You will see a message DllRegisterServer and DllInstall in shell32.dll succeeded
4. that’s it
 
Second Method:
1. Open Start >> Run and type regedit
2. Navigate to HKEY_CLASSES_ROOT/Directory/Shell
3. Double click the default key type none and press ok.
4. now navigate to HKEY_CLASSES_ROOT/Drive/Shell.
5. Double click the default key type none and press ok.
 
Third Method:
If you don’t want to play with the registry ,you can run the following command instead at
Run Prompt: ( Open Start >> Run )
“reg add hkcr\drive\shell /ve /d none /f” (without double quotes)

Fourth Method:
1. Open Start >> Run and type regedit
2. NOw Press Ctrl+F
3. Type "mountpoints2" (without quotes)
4. Delete all the mountpoints2 entries in the registry
5.that's it  


 
I hope at least one of the above method may work for you to fix the trouble, if not please let us know.
If still after following the above you are not able to solve the problem then update your antivirus and run a complete scan and make your system virus free.
 
 
Note: After editing the registry you may need to restart your system, so that the changes can reflect



Bimmy(sonumour@gmail.com)



Configure Laptop as a WIFI router


HERE'S STEP-BY-STEP INSTRUCTIONS TO USE A LAPTOP AS WIFI ROUTER AND ACCESS NET THROUGH IT ON ANY OTHER WIFI ENABLED DEVICE IN AD-HOC MODE....

1. Go to Start, Control Panel, Network Connections. Right click the wireless connection (it should be called “Wireless Network Connection”) and select properties.

2. On the window that will show up, click on the Wireless Networks tab. Make sure that no wireless networks are being listed under "Preferred Networks". If you see networks there, remove them one by one.

3. Click on Advanced button.Select “Computer-to-computer (ad-hoc) networks only” and click on Close.

4. Now click on Add. It is thru this window that we will create our wireless network. You will need to fill out the following:

* Network Name (SSID): This will be the name of your network. This is how your computers will call your network. 
* Network Authentication: Open.
* Data encryption: WEP.
* Uncheck the “The key is provided for me automatically” box.
* Configure your network key. This is a password that will be used to encrypt data transferred on your network, preventing neighbors from surfing the web for free and also preventing people to view or even delete your files, if file sharing is enabled on your network. You must fill this field. The key must have five alphanumerical characters. 

5. After clicking Ok, you will see your network listed under Preferred Networks. Your network will still be listed with a red “x”, this is absolutely normal.

6. Now you need to share your Internet connection. Pay attention because this is done on network card that has your broadband Internet connected, not on your wireless network card. Go to Network Connections (Start, Control Panel), right click the network card where your broadband Internet is connected to and then choose Properties. On the window that will show up, click on Advanced tab.There, check the “Allow other network users to connect thru this computer’s Internet connection” box and make sure that the “Allow other network users to control or disable the shared Internet connection” is unchecked.

7. Click Ok and now you will see “Shared” under the name of the network connection where your broadband Internet is connected to (usually called “Local Area Connection”). Your wireless connection will still be listed as “Not Connected”; this is absolutely normal. It will only change to “Connected” after any other computer has joined your network.

8. Now that your host computer is correctly configured, you need to configure the other computers that will have access to your wireless network.Now that you have configured the host computer, it is time to configure the other computers that will have access to your wireless network. This configuration is very simple; just follow these very simple steps:

9. If you configured your host computer correctly, your wireless network will now be listed on the available networks list of all computers that have a wireless network card within the range of the card installed on your host computer. Just click the wireless network icon available on the task bar or double click your wireless connection on Network Connections (Start, Control Panel) to see a list of wireless networks available.

10. After double-clicking your network, Windows will ask you the network encryption key.

11. After clicking Ok, your network status will be listed as “Acquiring Network Address” and then it will change to “Connected”.

12. After this point you will have access to the Internet using the Internet connection available on your host computer. Test your network by opening your web browser (Internet Explorer, Firefox, etc) and trying to open a well-known website like Google.

13. Now on your host computer its wireless connection will also appear as “connected”. Like we said before the wireless connection on the host computer will appear as “connected” only when other computers are connected to it.

14. In order to prevent instability issues on your wireless network, we recommend you to remove all other networks that may appear listed under Preferred Networks on all computers. This can be done right clicking your wireless connection on Network Connections 
(Start, Control Panel), selecting Properties, then on the window that will show up click on Wireless Networks tab. Remove all other networks listed under Preferred Networks but your own network.


Bimmy (sonumour@gmail.com)