Hi All,
In my previous post "PRIMARY STORAGE DEVICES PART-1" explained about RAM.
Now i am going to explain ROM(READ ONLY MEMORY).this is a permenant memory.
it controlls all BIOS programms.In RoM mailnly three parts important.
Those are....
1)POST (POWER ON SELF TEST)
IT WILL CHECK WHETHER ALL THE DEVICES ARE GETTING THE POWER SUPPLY OR NOT.
2)BSL (BOOT STRAP LOADER)
IT SELECTS THE VALID BOOT SECTOR.
3)DRIVERS
IT CONSISTS OF BASIC DEVICE DRIVERS AND CONFIGURATION OF MOTHER BOARD.
Sunday, December 26, 2010
Saturday, December 25, 2010
PRIMARY STORAGE DEVICES PART-1
Hi All,
In computer storage devices are devided in to 2 types .
Those are
1.primary storage devices .
2.secondary storage devices.
First Let's know something about primary storage devices.RAM and ROM(Read Only Memory).RAM (randam access memory) It is a volatile memory (means requires power supplycontinuously) andit is a temporary memory. it is divided into 2 types those are
1)SRAM (Static RAM)
It is cache memory.two types of cache memory present those are L1 & L2
L1 (Internal Memory with in the mother board)
L2(External Memory ) when your buying a Mother Board L2 cache like this 1MB,2MB,4MB etc.
2)DRAM(Dynamic RAM)
In DRAM various models are present.Those are
SD,DDR1,DDR2,DDR3,EDO Let's know ...
SD(Synchronous Dynamic)
The RAM 68 PINS and it's capacity is 32MB -512MB.5V POWER SUPPLY NEEDED.IT HAD A SINGLE NOCH AND 2 CUTS.
DDR1 (DOUBLE DATA RATE)
THE RAM 128PINS AND CAPACITY IS 2GB.IT HAD A 2NOCHES AND SINGLE CUT.CUT IS AT RIGHT SIDE.
DDR2
THE RAM 256 PINS AND CAPACITY IS 4GB AND 3.5V POWER SUPPLY NEEDED.CUT IS IN THE MIDDLE.
DDR3
THE RAM 512 PINS AND CAPACITY IS 8GB AND 3.3V POWERSUPPLY NEEDED.THE CUT IS AT LLEFT SIDE.
EDO(EXTENDED DATA OUTPUT)
IT IS USED IN SPARC MACHINES.
NOTE: In the upgradation of RAM two points are considered.
1.Storage capacity should be high.
2.power utlization should be less.
In computer storage devices are devided in to 2 types .
Those are
1.primary storage devices .
2.secondary storage devices.
First Let's know something about primary storage devices.RAM and ROM(Read Only Memory).RAM (randam access memory) It is a volatile memory (means requires power supplycontinuously) andit is a temporary memory. it is divided into 2 types those are
1)SRAM (Static RAM)
It is cache memory.two types of cache memory present those are L1 & L2
L1 (Internal Memory with in the mother board)
L2(External Memory ) when your buying a Mother Board L2 cache like this 1MB,2MB,4MB etc.
2)DRAM(Dynamic RAM)
In DRAM various models are present.Those are
SD,DDR1,DDR2,DDR3,EDO Let's know ...
SD(Synchronous Dynamic)
The RAM 68 PINS and it's capacity is 32MB -512MB.5V POWER SUPPLY NEEDED.IT HAD A SINGLE NOCH AND 2 CUTS.
DDR1 (DOUBLE DATA RATE)
THE RAM 128PINS AND CAPACITY IS 2GB.IT HAD A 2NOCHES AND SINGLE CUT.CUT IS AT RIGHT SIDE.
THE RAM 256 PINS AND CAPACITY IS 4GB AND 3.5V POWER SUPPLY NEEDED.CUT IS IN THE MIDDLE.
DDR3
THE RAM 512 PINS AND CAPACITY IS 8GB AND 3.3V POWERSUPPLY NEEDED.THE CUT IS AT LLEFT SIDE.
EDO(EXTENDED DATA OUTPUT)
IT IS USED IN SPARC MACHINES.
NOTE: In the upgradation of RAM two points are considered.
1.Storage capacity should be high.
2.power utlization should be less.
Friday, December 24, 2010
NEW GOOGLE OPERATING SYSTEM
Hi All,
CHROME OS----a pathbreaking innovation from Google.inc
What if nearly everything you usually keep on your computer — photos, documents, music and software — was stored online? Your machine would be speedier and perhaps less vital because you could simply use another machine to recoup your digital life should you lose your laptop.
This premise — somewhat scary, yet liberating — is behind Google Inc.'s upcoming Chrome OS, which will make notebook computers more like netbooks than most actual netbooks.
The software powering Chrome OS, which is based on the search giant's eponymously named browser, serves mainly as a tool for connecting your computer to the Web. That's where nearly everything you use is housed and linked to your Google username and password. It's a concept known as cloud computing.
A peek at the upcoming operating system and its vision of cloud computing shows a promising idea that could make computing faster and more convenient. But it still needs a lot of work.
Google expects the first computers powered by Chrome OS to be released this summer, and initially they'll be made by Acer Inc. and Samsung Electronics Co.
For now, though, Google is operating a pilot for some individuals and companies to test an unbranded laptop that runs Chrome OS. The company lent The Associated Press one of these machines, which aren't going to be sold to the public.
The laptop itself, called the Cr-48, doesn't really deserve to be critiqued, because it is a stripped-down machine that is chiefly a frame for Google's OS oeuvre. The shell is entirely matte black plastic, without a hint of branding. It has a webcam, a screen that is about 12 inches diagonally and a full-sized keyboard with a search key in place of the caps lock key.
The machine also has 16 gigabytes of flash memory for storing files, if you feel absolutely compelled to download something. Downloads are obviously discouraged, though; my music collection alone would nearly fill this allotment.
Moving on to the main event, Chrome OS brings a few clear benefits: Starting up the notebook takes just seconds — roughly 13 of them, according to my stopwatch — and waking the closed notebook from "sleep" mode is as quick as opening it up (almost too quick, as the notebook couldn't regain its wireless service quite as fast). By contrast, my Windows machine at work takes more than two minutes to boot up.
After you sign in with your Google account, the same username and password you would use to access Gmail, you can pull up a home page showing all the apps you've installed from the Chrome Web Store. Assuming you're connected to the Web, you can just start using apps and surfing the Web right away.
There were plenty of free and paid Web apps and browser extensions available when I tested the notebook. Some are only for the Chrome OS; others also work with Google's Chrome Web browser for other computers.
I installed a range of the free ones, some of which seemed to be just links to existing Web pages. The apps I snagged included Web-based office suite Google Docs, the chatting service Google Talk, Aviary's Advanced Image Editor and balloon-popping puzzle game Poppit.
As with smart phones and tablets such as Apple Inc.'s iPad, publications are also making Chrome apps. USA Today, The New York Times and The Wall Street Journal are among them.
On my work computer, it can take ages to open up applications that are stored on my hard drive. With the Cr-48, I could immediately start editing a Google Docs spreadsheet or tweak the colors in a photo using Aviary because the programs are all running online. I only needed a strong Internet connection.
Surfing the Web was a pretty normal experience, with most websites loading speedily, though the Cr-48 was not that good at displaying Flash videos.
But I felt constrained because I had to use the lone browser that comes with the system and the Web-based apps I obtained. Apps loaded slowly when my Internet connection wasn't stellar. This wouldn't be a problem with programs stored on a regular computer's hard drive.
If a Chrome OS-based laptop becomes my primary computer, a data plan would be a must.
I feel anxious just thinking about the possibility that I couldn't access my documents at any time, and I don't even keep anything that important on my own laptop.
I mostly used the notebook with Wi-Fi at home and at the office, though I also tried out its 3G network service, which is provide by Verizon Wireless.
So what happens if you don't have any Internet access? The Cr-48 is pretty useless.
I could still write in an already-open Google Docs document, add notes in Scratchpad and look at photos I'd downloaded. But I couldn't use apps that are not yet opened because they're all connected to the Web.
If you lose your connection while using an app, you may be able to view some information that has been temporarily stored in memory, as I could when browsing The New York Times' app. But you'll need to get online as soon as possible to really use the machine. Faced with this situation, I'd probably just search frantically for an Internet connection or simply put away my laptop.
In its current state, the Chrome OS is far from ready to take over as my main computer, even if I were using it on a more powerful machine than the Cr-48.
What if nearly everything you usually keep on your computer — photos, documents, music and software — was stored online? Your machine would be speedier and perhaps less vital because you could simply use another machine to recoup your digital life should you lose your laptop.
This premise — somewhat scary, yet liberating — is behind Google Inc.'s upcoming Chrome OS, which will make notebook computers more like netbooks than most actual netbooks.
The software powering Chrome OS, which is based on the search giant's eponymously named browser, serves mainly as a tool for connecting your computer to the Web. That's where nearly everything you use is housed and linked to your Google username and password. It's a concept known as cloud computing.
A peek at the upcoming operating system and its vision of cloud computing shows a promising idea that could make computing faster and more convenient. But it still needs a lot of work.
Google expects the first computers powered by Chrome OS to be released this summer, and initially they'll be made by Acer Inc. and Samsung Electronics Co.
For now, though, Google is operating a pilot for some individuals and companies to test an unbranded laptop that runs Chrome OS. The company lent The Associated Press one of these machines, which aren't going to be sold to the public.
The laptop itself, called the Cr-48, doesn't really deserve to be critiqued, because it is a stripped-down machine that is chiefly a frame for Google's OS oeuvre. The shell is entirely matte black plastic, without a hint of branding. It has a webcam, a screen that is about 12 inches diagonally and a full-sized keyboard with a search key in place of the caps lock key.
The machine also has 16 gigabytes of flash memory for storing files, if you feel absolutely compelled to download something. Downloads are obviously discouraged, though; my music collection alone would nearly fill this allotment.
Moving on to the main event, Chrome OS brings a few clear benefits: Starting up the notebook takes just seconds — roughly 13 of them, according to my stopwatch — and waking the closed notebook from "sleep" mode is as quick as opening it up (almost too quick, as the notebook couldn't regain its wireless service quite as fast). By contrast, my Windows machine at work takes more than two minutes to boot up.
After you sign in with your Google account, the same username and password you would use to access Gmail, you can pull up a home page showing all the apps you've installed from the Chrome Web Store. Assuming you're connected to the Web, you can just start using apps and surfing the Web right away.
There were plenty of free and paid Web apps and browser extensions available when I tested the notebook. Some are only for the Chrome OS; others also work with Google's Chrome Web browser for other computers.
I installed a range of the free ones, some of which seemed to be just links to existing Web pages. The apps I snagged included Web-based office suite Google Docs, the chatting service Google Talk, Aviary's Advanced Image Editor and balloon-popping puzzle game Poppit.
As with smart phones and tablets such as Apple Inc.'s iPad, publications are also making Chrome apps. USA Today, The New York Times and The Wall Street Journal are among them.
On my work computer, it can take ages to open up applications that are stored on my hard drive. With the Cr-48, I could immediately start editing a Google Docs spreadsheet or tweak the colors in a photo using Aviary because the programs are all running online. I only needed a strong Internet connection.
Surfing the Web was a pretty normal experience, with most websites loading speedily, though the Cr-48 was not that good at displaying Flash videos.
But I felt constrained because I had to use the lone browser that comes with the system and the Web-based apps I obtained. Apps loaded slowly when my Internet connection wasn't stellar. This wouldn't be a problem with programs stored on a regular computer's hard drive.
If a Chrome OS-based laptop becomes my primary computer, a data plan would be a must.
I feel anxious just thinking about the possibility that I couldn't access my documents at any time, and I don't even keep anything that important on my own laptop.
I mostly used the notebook with Wi-Fi at home and at the office, though I also tried out its 3G network service, which is provide by Verizon Wireless.
So what happens if you don't have any Internet access? The Cr-48 is pretty useless.
I could still write in an already-open Google Docs document, add notes in Scratchpad and look at photos I'd downloaded. But I couldn't use apps that are not yet opened because they're all connected to the Web.
If you lose your connection while using an app, you may be able to view some information that has been temporarily stored in memory, as I could when browsing The New York Times' app. But you'll need to get online as soon as possible to really use the machine. Faced with this situation, I'd probably just search frantically for an Internet connection or simply put away my laptop.
In its current state, the Chrome OS is far from ready to take over as my main computer, even if I were using it on a more powerful machine than the Cr-48.
vmware image of chrome is available .and it's using network installation method the os installed.
your gmail account used as user information.
Wednesday, December 22, 2010
How to Trace Mobile Numbers in india
Hi All,
With the rapid growth of mobile phone usage in recent years, we have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number becomes a vital part of the investigation process. Also sometimes we just want to trace a mobile number for reasons like annoying prank calls, blackmails, unknown number in a missed call list or similar.
Even though it is not possible to trace the number back to the caller, it is possible to trace it to the location of the caller and also find the network operator. Just have a look at this page on tracing Indian mobile numbers from Wikipedia. Using the information provided on this page, it is possible to certainly trace any mobile number from India and find out the location (state/city) and network operator (mobile operator) of the caller. All you need for this is only the first 4-digit of the mobile number. In this Wiki page you will find all the mobile number series listed in a nice tabular column where they are categorized based on mobile operator and the zone (state/city). This Wiki page is updated regularly so as to provide up-to-date information on newly added mobile number series and operators. I have used this page many a time and have never been disappointed.
If you would like to use a simpler interface where in you can just enter the target mobile number and trace the desired details, you can try this link from Numbering Plans. Using this link, you can trace any number in the world.
By using the information in this article, you can only know “where” the call is from and not “who” the caller is. Only the mobile operator is able to tell you ”who” the caller is. So if you’re in an emergency and need to find out the actual person behind the call, I would recommend that you file a complaint and take the help of police. I hope this information has helped you!
With the rapid growth of mobile phone usage in recent years, we have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number becomes a vital part of the investigation process. Also sometimes we just want to trace a mobile number for reasons like annoying prank calls, blackmails, unknown number in a missed call list or similar.
Even though it is not possible to trace the number back to the caller, it is possible to trace it to the location of the caller and also find the network operator. Just have a look at this page on tracing Indian mobile numbers from Wikipedia. Using the information provided on this page, it is possible to certainly trace any mobile number from India and find out the location (state/city) and network operator (mobile operator) of the caller. All you need for this is only the first 4-digit of the mobile number. In this Wiki page you will find all the mobile number series listed in a nice tabular column where they are categorized based on mobile operator and the zone (state/city). This Wiki page is updated regularly so as to provide up-to-date information on newly added mobile number series and operators. I have used this page many a time and have never been disappointed.
If you would like to use a simpler interface where in you can just enter the target mobile number and trace the desired details, you can try this link from Numbering Plans. Using this link, you can trace any number in the world.
By using the information in this article, you can only know “where” the call is from and not “who” the caller is. Only the mobile operator is able to tell you ”who” the caller is. So if you’re in an emergency and need to find out the actual person behind the call, I would recommend that you file a complaint and take the help of police. I hope this information has helped you!
HOW FIREWALL WORKS
Hi All,
If you have been using Internet on a regular basis or working in a large company and surf the Internet while you are at work, you must have surely come across the term firewall. You might have also heard of people saying “firewalls protect their computer from web attacks and hackers” or “a certain website has been blocked by firewall in their work place”. If you have ever wondered to know what exactly is this firewall and how it works, here we go. In this post I will try to explain “How firewalls work” and proxy is also using as a firewall in some places.
Firewalls may decide to allow or block network traffic between devices based on the rules that are pre-configured or set by the firewall administrator. Most personal firewalls such as Windows firewall operate on a set of pre-configured rules that are most suitable under normal circumstances so that the user need not worry much about configuring the firewall.
Personal firewalls are easy to install and use and hence preferred by end-users for use on their personal computers. However large networks and companies prefer those firewalls that have plenty of options to configure so as to meet their customized needs. For example, a company may set up different firewall rules for FTP servers, Telnet servers and Web servers. In addition the company can even control how the employees connect to the Internet by blocking access to certain websites or restricting the transfer of files to other networks. Thus in addition to security, a firewall can give the company a tremendous control over how people use the network.
Firewalls use one or more of the following methods to control the incoming and outgoing traffic in a network:
1. Packet Filtering: In this method packets (small chunks of data) are analyzed against a set of filters. Packet filters has a set of rules that come with accept and deny actions which are pre-configured or can be configured manually by the firewall administrator. If the packet manages to make it through these filters then it is allowed to reach the destination; otherwise it is discarded.
2. Stateful Inspection: This is a newer method that doesn’t analyze the contents of the packets. Instead it compares certain key aspects of each packet to a database of trusted source. Both incoming and outgoing packets are compared against this database and if the comparison yields a reasonable match, then the packets are allowed to travel further. Otherwise they are discarded.
1. IP addresses: In any case if an IP address outside the network is said to be unfavorable, then it is possible to set filter to block all the traffic to and from that IP address. For example, if a cetain IP address is found to be making too many connections to a server, the administrator may decide to block traffic from this IP using the firewall.
2. Domain names: Since it is difficult to remember the IP addresses, it is an easier and smarter way to configure the firewalls by adding filters based on domain names. By setting up a domain filter, a company may decide to block all access to certain domain names, or may provide access only to a list of selected domain names.
3. Ports/Protocols: Every service running on a server is made available to the Internet using numbered ports, one for each service. In simple words, ports can be compared to virtual doors of the server through which services are made available. For example, if a server is running a Web (HTTP) service then it will be typically available on port 80. In order to avail this service, the client needs to connect to the server via port 80. Similarly different services such as Telnet (Port 23), FTP (port 21) and SMTP (port 25) services may be running on the server. If the services are intended for the public, they are usually kept open. Otherwise they are blocked using the firewall so as to prevent intruders from using the open ports for making unauthorized connections.
4. Specific words or phrases: A firewall can be configured to filter one or more specific words or phrases so that, both the incoming and outgoing packets are scanned for the words in the filter. For example, you may set up a firewall rule to filter any packet that contains an offensive term or a phrase that you may decide to block from entering or leaving your network.
thank u...........
If you have been using Internet on a regular basis or working in a large company and surf the Internet while you are at work, you must have surely come across the term firewall. You might have also heard of people saying “firewalls protect their computer from web attacks and hackers” or “a certain website has been blocked by firewall in their work place”. If you have ever wondered to know what exactly is this firewall and how it works, here we go. In this post I will try to explain “How firewalls work” and proxy is also using as a firewall in some places.
How Firewalls Work
Firewalls are basically a barrier between your computer (or a network) and the Internet (outside world). A firewall can be simply compared to a security guard who stands at the entrance of your house and filters the visitors coming to your place. He may allow some visitors to enter while denying others whom he suspects of being intruders. Similarly a firewall is a software program or a hardware device that filters the information (packets) coming through the Internet to your personal computer or a computer network.Firewalls may decide to allow or block network traffic between devices based on the rules that are pre-configured or set by the firewall administrator. Most personal firewalls such as Windows firewall operate on a set of pre-configured rules that are most suitable under normal circumstances so that the user need not worry much about configuring the firewall.
Personal firewalls are easy to install and use and hence preferred by end-users for use on their personal computers. However large networks and companies prefer those firewalls that have plenty of options to configure so as to meet their customized needs. For example, a company may set up different firewall rules for FTP servers, Telnet servers and Web servers. In addition the company can even control how the employees connect to the Internet by blocking access to certain websites or restricting the transfer of files to other networks. Thus in addition to security, a firewall can give the company a tremendous control over how people use the network.
Firewalls use one or more of the following methods to control the incoming and outgoing traffic in a network:
1. Packet Filtering: In this method packets (small chunks of data) are analyzed against a set of filters. Packet filters has a set of rules that come with accept and deny actions which are pre-configured or can be configured manually by the firewall administrator. If the packet manages to make it through these filters then it is allowed to reach the destination; otherwise it is discarded.
2. Stateful Inspection: This is a newer method that doesn’t analyze the contents of the packets. Instead it compares certain key aspects of each packet to a database of trusted source. Both incoming and outgoing packets are compared against this database and if the comparison yields a reasonable match, then the packets are allowed to travel further. Otherwise they are discarded.
Firewall Configuration
Firewalls can be configured by adding one or more filters based on several conditions as mentioned below:1. IP addresses: In any case if an IP address outside the network is said to be unfavorable, then it is possible to set filter to block all the traffic to and from that IP address. For example, if a cetain IP address is found to be making too many connections to a server, the administrator may decide to block traffic from this IP using the firewall.
2. Domain names: Since it is difficult to remember the IP addresses, it is an easier and smarter way to configure the firewalls by adding filters based on domain names. By setting up a domain filter, a company may decide to block all access to certain domain names, or may provide access only to a list of selected domain names.
3. Ports/Protocols: Every service running on a server is made available to the Internet using numbered ports, one for each service. In simple words, ports can be compared to virtual doors of the server through which services are made available. For example, if a server is running a Web (HTTP) service then it will be typically available on port 80. In order to avail this service, the client needs to connect to the server via port 80. Similarly different services such as Telnet (Port 23), FTP (port 21) and SMTP (port 25) services may be running on the server. If the services are intended for the public, they are usually kept open. Otherwise they are blocked using the firewall so as to prevent intruders from using the open ports for making unauthorized connections.
4. Specific words or phrases: A firewall can be configured to filter one or more specific words or phrases so that, both the incoming and outgoing packets are scanned for the words in the filter. For example, you may set up a firewall rule to filter any packet that contains an offensive term or a phrase that you may decide to block from entering or leaving your network.
Hardware vs. Software Firewall
Hardware firewalls provide higher level of security and hence preferred for servers where security has the top most priority whereas, the software firewalls are less expensive and are most preferred in home computers and laptops. Hardware firewalls usually come as an in-built unit of a router and provide maximum security as it filters each packet in the hardware level itself even before it manages to enter your computer. A good example is the Linksys Cable/DSL router.Why Firewall?
Firewalls provide security over a number of online threats such as Remote login, Trojan backdoors, Session hijacking, DOS & DDOS attacks, viruses, cookie stealing and many more. The effectiveness of the security depends on the way you configure the firewall and how you set up the filter rules. However major threats such as DOS and DDOS attacks may sometimes manage to bypass the firewalls and do the damage to the server. Even though firewall is not a complete answer to online threats, it can most effectively handle the attacks and provide security to the computer up to the maximum possible extent.thank u...........
Wednesday, December 15, 2010
Log trick using notepad
Hi All,
This is simple, open notepad and type
Whenever you open the file with that text in the first line in the notepad, it will insert the current date and time at the end of the file. You can start entering your text after that.
This is simple, open notepad and type
.LOG
Save it as .LOG.txtWhenever you open the file with that text in the first line in the notepad, it will insert the current date and time at the end of the file. You can start entering your text after that.
Tuesday, December 7, 2010
How To Make Matrix With NotePad
Hi All,
Are you remember the matrix movie .now let's try that trick using simple notepad......
I’am going to show you how to make cool Matrix batch file using notepad.
Open notepad and type in
CODE :
Save it as matrix.bat
Double click on file and it will open the matrix
that's all .....................
Are you remember the matrix movie .now let's try that trick using simple notepad......
I’am going to show you how to make cool Matrix batch file using notepad.
Open notepad and type in
CODE :
@echo off
color 2
:start
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
goto start
Save it as matrix.bat
Double click on file and it will open the matrix
that's all .....................
Monday, December 6, 2010
URL
Hi All,
URL may be described in computing world as a Uniform resource Identifier which actually is used to specify about the location of an identified resource and also define the mechanism in order to retrieve information from that resource. Uniform Resource Locator or you may say URL is actually described or considered in popular usage as well as in the documents of technical writing and several discussion discussions on Internet as URI’s synonym.
Most common usage or you may say function of URL or you may say Uniform Resource Locator is known as the identifier of any web page or simply the web page address is recognized today as the URL in the world of World Wide Web. Web address or a URL of any web page is normally written as http:www.example.com/
It was year 1994 when first time the Uniform Resource Locator or you may say URL was created and the creator of this type was Tim Berners-Lee along with the coordination of “Internet Engineering Task Force” which is recognized being a working group of URI. Syntax of file path used in Unix, is actually used being the URL format in World Wide Web as forward slashes in Unix operating system are actually utilized to separate or differentiate folders or you may directories as well as resource names and files.
File format in URL is normally ends with the usage of a dot suffix like file.php or file.html and file.txt in which .php files are sent directly to the pre-processor before retrieving back the result of that file to user’s monitor.
URL may be described in computing world as a Uniform resource Identifier which actually is used to specify about the location of an identified resource and also define the mechanism in order to retrieve information from that resource. Uniform Resource Locator or you may say URL is actually described or considered in popular usage as well as in the documents of technical writing and several discussion discussions on Internet as URI’s synonym.
Most common usage or you may say function of URL or you may say Uniform Resource Locator is known as the identifier of any web page or simply the web page address is recognized today as the URL in the world of World Wide Web. Web address or a URL of any web page is normally written as http:www.example.com/
It was year 1994 when first time the Uniform Resource Locator or you may say URL was created and the creator of this type was Tim Berners-Lee along with the coordination of “Internet Engineering Task Force” which is recognized being a working group of URI. Syntax of file path used in Unix, is actually used being the URL format in World Wide Web as forward slashes in Unix operating system are actually utilized to separate or differentiate folders or you may directories as well as resource names and files.
Sunday, December 5, 2010
Jonathan James HACKER
Hi All,
guess who is this guy ?
He is Jonathan James born in 1983 December 12 turned out to be the worlds most threatening and biggest hacker.James at the age of 16 hacked in to the Defense Threat Reduction Agency (DTRA).Jonathan James also hacked in to the NASA systems and stole software worth $1.7 million.
He lived for a very short period of life and he died at the age of 24. The exact reason for his death is not revealed but according to the sources it seems that he committed suicide.He is termed to be the Worlds best since in a very short span of his life he cracked down all the high profile organizations security including that of NASA.WORLDS TOP SECOND HACKER OF ALL TIME.
THANK U ...............
guess who is this guy ?
He is Jonathan James born in 1983 December 12 turned out to be the worlds most threatening and biggest hacker.James at the age of 16 hacked in to the Defense Threat Reduction Agency (DTRA).Jonathan James also hacked in to the NASA systems and stole software worth $1.7 million.
He lived for a very short period of life and he died at the age of 24. The exact reason for his death is not revealed but according to the sources it seems that he committed suicide.He is termed to be the Worlds best since in a very short span of his life he cracked down all the high profile organizations security including that of NASA.WORLDS TOP SECOND HACKER OF ALL TIME.
THANK U ...............
FILE SYSTEM
Hi All,
Most of the people heared about file systems .so now i am showing some thing about this filesystem....
The method for storing and retrieving files on a disk. It is system software that takes commands from the operating system to read
and write the disk clusters (groups of sectors). The file system manages a folder/directory structure, which provides an index to the files,
and it defines the syntax used to access them (how the "path" to the file is coded). File systems dictate how files are named as well as the
maximum size of a file or volume.
There are numerous file systems in use; for example, FAT32 and NTFS are Windows file systems, and HFS(Hierarchical File System) is used on Macs. Linux uses ext2, ext3,ext4 and FAT32.
Unix systems use UFS, ext2, ext3,ext4 and ZFS. See cluster, path, FAT32, NTFS, HFS, NFS, UFS, ext, ZFS and hierarchical file system.
A data processing application that manages individual files. It opens, closes, reads and writes the file as a single entity. In a file system,
files are related to each other by customized programming (customers to orders, vendors to purchases, etc.). Contrast with a "relational database,
"which has built-in constructs that can more easily form these relationships. For example, they can be used to join files together and split them apart,
all without tedious programming. See relational database and DBMS.
WINDOWS :FAT16,FAT32,NTFS FILE SYSTEM
LINUX :EXT2,EXT3 AND LATEST ONE IS EXT4 FILE SYSTEM(MAC OS ALSO )
UNIX :UFS,EXT,ZFS.
THANK U...................
Most of the people heared about file systems .so now i am showing some thing about this filesystem....
The method for storing and retrieving files on a disk. It is system software that takes commands from the operating system to read
and write the disk clusters (groups of sectors). The file system manages a folder/directory structure, which provides an index to the files,
and it defines the syntax used to access them (how the "path" to the file is coded). File systems dictate how files are named as well as the
maximum size of a file or volume.
There are numerous file systems in use; for example, FAT32 and NTFS are Windows file systems, and HFS(Hierarchical File System) is used on Macs. Linux uses ext2, ext3,ext4 and FAT32.
Unix systems use UFS, ext2, ext3,ext4 and ZFS. See cluster, path, FAT32, NTFS, HFS, NFS, UFS, ext, ZFS and hierarchical file system.
A data processing application that manages individual files. It opens, closes, reads and writes the file as a single entity. In a file system,
files are related to each other by customized programming (customers to orders, vendors to purchases, etc.). Contrast with a "relational database,
"which has built-in constructs that can more easily form these relationships. For example, they can be used to join files together and split them apart,
all without tedious programming. See relational database and DBMS.
WINDOWS :FAT16,FAT32,NTFS FILE SYSTEM
LINUX :EXT2,EXT3 AND LATEST ONE IS EXT4 FILE SYSTEM(MAC OS ALSO )
UNIX :UFS,EXT,ZFS.
THANK U...................
Saturday, December 4, 2010
What to Do when Ur Orkut is Hacked!
Hi All,
It can be a nightmare if someone else takes control of your Google Account because all your Google services like Gmail, Orkut, Google Calendar, Blogger, AdSense, Google Docs and even Google Checkout are tied to the same account.
Here are some options suggested by Google Support when you forget the Gmail password or if someone else takes ownership of your Google Account and changes the password:
Here are some options suggested by Google Support when you forget the Gmail password or if someone else takes ownership of your Google Account and changes the password:
1. Reset Your Google Account Password:
Type the email address associated with your Google Account or Gmail user name at google.com/accounts/ForgotPasswd - you will receive an email at your secondary email address with a link to reset your Google Account Password.
This will not work if the other person has changed your secondary email address or if you no longer have access to that address.
2. For Google Accounts Associated with Gmail:
If you have problems while logging into your Gmail account, you can consider contacting Google by filling this form. It however requires you to remember the exact date when you created that Gmail account.
3. For Hijacked Google Accounts Not Linked to Gmail:
If your Google Account doesn’t use a Gmail address, contact Google by filling this form. This approach may help bring back your Google Account if you religiously preserve all your old emails. You will be required to know the exact creation date of your Google Account plus a copy of that original “Google Email Verification” message.
It may be slightly tough to get your Google Account back but definitely not impossible if you have the relevant information in your secondary email mailbox.
Type the email address associated with your Google Account or Gmail user name at google.com/accounts/ForgotPasswd - you will receive an email at your secondary email address with a link to reset your Google Account Password.
This will not work if the other person has changed your secondary email address or if you no longer have access to that address.
2. For Google Accounts Associated with Gmail:
If you have problems while logging into your Gmail account, you can consider contacting Google by filling this form. It however requires you to remember the exact date when you created that Gmail account.
3. For Hijacked Google Accounts Not Linked to Gmail:
If your Google Account doesn’t use a Gmail address, contact Google by filling this form. This approach may help bring back your Google Account if you religiously preserve all your old emails. You will be required to know the exact creation date of your Google Account plus a copy of that original “Google Email Verification” message.
It may be slightly tough to get your Google Account back but definitely not impossible if you have the relevant information in your secondary email mailbox.
thank u ..........
shut down friend computer
Hi All,
Convey your friend a little message and shut down his / her computer:
Type :
@echo off
msg * I don't like you
shutdown -c "Error! You are too ******!" -s
Save it as "Anything.BAT" in All Files and send it.
Convey your friend a little message and shut down his / her computer:
Type :
@echo off
msg * I don't like you
shutdown -c "Error! You are too ******!" -s
Save it as "Anything.BAT" in All Files and send it.
Thursday, December 2, 2010
TEXT MOVING WITH CURSOR
Hi All,
Now i am going to show you some script which moves text with cursor in web page place this code after <head> tag .
<script language="javascript">
// ENTER TEXT BELOW. CAN *NOT* INCLUDE NORMAL HTML CODE.
var text='WELCOME TO MY BLOG(write your text here)';
var delay=30; // SPEED OF TRAIL
var Xoff=0; // PIXEL COUNT FROM THE LEFT OF THE CURSOR (- VALUES GO TO LEFT)
var Yoff=-40; // PIXEL COUNT FROM THE TOP OF THE CURSOR (- VALUES GO UP)
var txtw=30; // AMOUNT OF PIXEL SPACE EACH CHARACTER OCCUPIES
var beghtml='<font color="#09FF00"><FONT SIZE=4><b>'; // OPTIONAL HTML CODE THAT EFFECTS WHOLE TEXT STRING SUCH AS FONT COLOR, SIZE, ETC.
var endhtml='</b></font>'; // END HTML CODE. MOSTLY USED IF ABOVE SETTING IS USED.
//********** NO NEED TO EDIT BELOW HERE **********\\
ns4 = (navigator.appName.indexOf("Netscape")>=0 && document.layers)? true : false;
ie4 = (document.all && !document.getElementById)? true : false;
ie5 = (document.all && document.getElementById)? true : false;
ns6 = (document.getElementById && navigator.appName.indexOf("Netscape")>=0 )? true: false;
var txtA=new Array();
text=text.split('');
var x1=0;
var y1=-1000;
var t='';
for(i=1;i<=text.length;i++){
t+=(ns4)? '<layer name="txt'+i+'" top="-100" left="0" width="'+txtw+'" height="1">' : '<div id="txt'+i+'" style="position:absolute; top:-100px; left:0px; height:1px; width:'+txtw+'; visibility:visible;">';
t+=beghtml+text[i-1]+endhtml;
t+=(ns4)? '</layer>' : '</div>';
}
document.write(t);
function moveid(id,x,y){
if(ns4)id.moveTo(x,y);
else{
id.style.left=x+'px';
id.style.top=y+'px';
}}
function animate(evt){
x1=Xoff+((ie4||ie5)?event.clientX+document.body.scrollLeft:evt.pageX);
y1=Yoff+((ie4||ie5)?event.clientY+document.body.scrollTop:evt.pageY);
}
function getidleft(id){
if(ns4)return id.left;
else return parseInt(id.style.left);
}
function getidtop(id){
if(ns4)return id.top;
else return parseInt(id.style.top);
}
function getwindowwidth(){
if(ie4||ie5)return document.body.clientWidth+document.body.scrollLeft;
else return window.innerWidth+pageXOffset;
}
function movetxts(){
for(i=text.length;i>1;i=i-1){
if(getidleft(txtA[i-1])+txtw*2>=getwindowwidth()){
moveid(txtA[i-1],0,-1000);
moveid(txtA[i],0,-1000);
}else moveid(txtA[i], getidleft(txtA[i-1])+txtw, getidtop(txtA[i-1]));
}
moveid(txtA[1],x1,y1);
}
window.onload=function(){
for(i=1;i<=text.length;i++)txtA[i]=(ns4)?document.layers['txt'+i]:(ie4)?document.all['txt'+i]:document.getElementById('txt'+i);
if(ns4)document.captureEvents(Event.MOUSEMOVE);
document.onmousemove=animate;
setInterval('movetxts()',delay);
}
</script>
Now i am going to show you some script which moves text with cursor in web page place this code after <head> tag .
source code:
// ENTER TEXT BELOW. CAN *NOT* INCLUDE NORMAL HTML CODE.
var text='WELCOME TO MY BLOG(write your text here)';
var delay=30; // SPEED OF TRAIL
var Xoff=0; // PIXEL COUNT FROM THE LEFT OF THE CURSOR (- VALUES GO TO LEFT)
var Yoff=-40; // PIXEL COUNT FROM THE TOP OF THE CURSOR (- VALUES GO UP)
var txtw=30; // AMOUNT OF PIXEL SPACE EACH CHARACTER OCCUPIES
var beghtml='<font color="#09FF00"><FONT SIZE=4><b>'; // OPTIONAL HTML CODE THAT EFFECTS WHOLE TEXT STRING SUCH AS FONT COLOR, SIZE, ETC.
var endhtml='</b></font>'; // END HTML CODE. MOSTLY USED IF ABOVE SETTING IS USED.
//********** NO NEED TO EDIT BELOW HERE **********\\
ns4 = (navigator.appName.indexOf("Netscape")>=0 && document.layers)? true : false;
ie4 = (document.all && !document.getElementById)? true : false;
ie5 = (document.all && document.getElementById)? true : false;
ns6 = (document.getElementById && navigator.appName.indexOf("Netscape")>=0 )? true: false;
var txtA=new Array();
text=text.split('');
var x1=0;
var y1=-1000;
var t='';
for(i=1;i<=text.length;i++){
t+=(ns4)? '<layer name="txt'+i+'" top="-100" left="0" width="'+txtw+'" height="1">' : '<div id="txt'+i+'" style="position:absolute; top:-100px; left:0px; height:1px; width:'+txtw+'; visibility:visible;">';
t+=beghtml+text[i-1]+endhtml;
t+=(ns4)? '</layer>' : '</div>';
}
document.write(t);
function moveid(id,x,y){
if(ns4)id.moveTo(x,y);
else{
id.style.left=x+'px';
id.style.top=y+'px';
}}
function animate(evt){
x1=Xoff+((ie4||ie5)?event.clientX+document.body.scrollLeft:evt.pageX);
y1=Yoff+((ie4||ie5)?event.clientY+document.body.scrollTop:evt.pageY);
}
function getidleft(id){
if(ns4)return id.left;
else return parseInt(id.style.left);
}
function getidtop(id){
if(ns4)return id.top;
else return parseInt(id.style.top);
}
function getwindowwidth(){
if(ie4||ie5)return document.body.clientWidth+document.body.scrollLeft;
else return window.innerWidth+pageXOffset;
}
function movetxts(){
for(i=text.length;i>1;i=i-1){
if(getidleft(txtA[i-1])+txtw*2>=getwindowwidth()){
moveid(txtA[i-1],0,-1000);
moveid(txtA[i],0,-1000);
}else moveid(txtA[i], getidleft(txtA[i-1])+txtw, getidtop(txtA[i-1]));
}
moveid(txtA[1],x1,y1);
}
window.onload=function(){
for(i=1;i<=text.length;i++)txtA[i]=(ns4)?document.layers['txt'+i]:(ie4)?document.all['txt'+i]:document.getElementById('txt'+i);
if(ns4)document.captureEvents(Event.MOUSEMOVE);
document.onmousemove=animate;
setInterval('movetxts()',delay);
}
</script>
Notepad ++ 5.8.5
Hi All,
Notepad ++ 5.8.5
Notepad++ is a free source code editor and Notepad replacement that supports several languages. Running in the MS Windows environment, its use is governed by GPL Licence.
Based on a powerful editing component Scintilla, Notepad++ is written in C++ and uses pure Win32 API and STL which ensures a higher execution speed and smaller program size. By optimizing as many routines as possible without losing user friendliness, Notepad++ is trying to reduce the world carbon dioxide emissions. When using less CPU power, the PC can throttle down and reduce power consumption, resulting in a greener environment.
Based on a powerful editing component Scintilla, Notepad++ is written in C++ and uses pure Win32 API and STL which ensures a higher execution speed and smaller program size. By optimizing as many routines as possible without losing user friendliness, Notepad++ is trying to reduce the world carbon dioxide emissions. When using less CPU power, the PC can throttle down and reduce power consumption, resulting in a greener environment.
- Syntax Highlighting and Syntax Folding
- WYSIWYG
- User Defined Syntax Highlighting
- Auto-completion
- Multi-Document
- Multi-View
- Regular Expression Search/Replace supported
- Full Drag 'N' Drop supported
- Dynamic position of Views
- File Status Auto-detection
- Zoom in and zoom out
- Multi-Language environment supported
- Bookmark
- Brace and Indent guideline Highlighting
- Macro recording and playback
Monday, November 29, 2010
RESTART YOUR PC IN LESS THAN A SECOND
Hi All,
Computer takes a lot of time for restart. We need to restart our computer, everytime we install some software but when we have limited time and we are busy then it is very annoying to wait for it to restart.Its quite irritating.
So here is solution for this problem. In that case you need not to restart your computer but you can restart your windows without restarting computer. It will take very less time.In fact no time.
To restart windows without restarting computer you just need to press "Shift " key down while clicking on restart button.(shift+restart )
Your computer would restart without restarting the Computer.
Restart Windows without Restarting PC, this term is known as Hot Booting.
CLOSE ALL OPEN WINDOW'S TABS IN A SINGLE CLICK
Hi All,
NOW YOU CAN CLOSE MULTIPLE WINDOWS TAB AT ONCE IN A SINGLE CLICK
SmartClose is a free Windows utility that you can use to quickly close all programs currently running in Windows. This can be quite useful, for example, when you have to shutdown all running programs before installing a new application. I find that quite annoying because I usually have 10 different things running and I have to manually close them one by one and then re-open them once I’ve installed my program.
That’s where SmartClose really makes things a lot easier. With SmartClose, the process is fast and automatic, as it takes a snapshot of all of your currently running programs, and not only closes all of your applications for you, but also restores them later on. This is actually a very useful program for many people because you can startup 4 to 5 of your favorite apps and then save a snapshot, which you can them simply restore at any time by using the program. It can even restore Explorer and Internet Explorer windows to their previous locations on the screen.
That way instead of having to click on 5 different icons, etc, you can quickly start up applications using SmartClose. Another really nice feature about SmartClose is that you can configure it to shutdown or stop Windows services also. It actually comes with a list of services that it deems as closable, but you can add or subtract if you know what you’re doing. The great thing about SmartClose is that it’s not stupid and won’t close out services that Windows needs in order to be able to run.
Once you have it installed, you can begin by creating a snapshot and closing all programs, restoring a snapshot (restore apps), or changing the program settings.
download here:
http://www.snapfiles.com/downloads/smartclose/dlsmartclose.html
The program also has a good number of configuration options as show below:
GENERAL OPTION
Close Programs
Restore Settings
I tested it out on my computer and it worked very well. I opened about 10 applications including Outlook, Photoshop, Firefox, etc and then saved a snapshot and shut everything down. I then proceeded to restore the snapshot and I had all my programs back up and running in no time! Pretty cool app and definitely very useful on a day to day basis! Enjoy!
SmartClose is a free Windows utility that you can use to quickly close all programs currently running in Windows. This can be quite useful, for example, when you have to shutdown all running programs before installing a new application. I find that quite annoying because I usually have 10 different things running and I have to manually close them one by one and then re-open them once I’ve installed my program.
That’s where SmartClose really makes things a lot easier. With SmartClose, the process is fast and automatic, as it takes a snapshot of all of your currently running programs, and not only closes all of your applications for you, but also restores them later on. This is actually a very useful program for many people because you can startup 4 to 5 of your favorite apps and then save a snapshot, which you can them simply restore at any time by using the program. It can even restore Explorer and Internet Explorer windows to their previous locations on the screen.
That way instead of having to click on 5 different icons, etc, you can quickly start up applications using SmartClose. Another really nice feature about SmartClose is that you can configure it to shutdown or stop Windows services also. It actually comes with a list of services that it deems as closable, but you can add or subtract if you know what you’re doing. The great thing about SmartClose is that it’s not stupid and won’t close out services that Windows needs in order to be able to run.
Once you have it installed, you can begin by creating a snapshot and closing all programs, restoring a snapshot (restore apps), or changing the program settings.
download here:
http://www.snapfiles.com/downloads/smartclose/dlsmartclose.html
The program also has a good number of configuration options as show below:
GENERAL OPTION
Close Programs
Restore Settings
I tested it out on my computer and it worked very well. I opened about 10 applications including Outlook, Photoshop, Firefox, etc and then saved a snapshot and shut everything down. I then proceeded to restore the snapshot and I had all my programs back up and running in no time! Pretty cool app and definitely very useful on a day to day basis! Enjoy!
Thursday, November 25, 2010
Extensions to Decorate New Tabs in Chrome
Hi All,
Do you want to experiment new ways to improve productivity? If your answer is yes, then here is something for you. We will have a look at 5 beautiful chrome extensions that changes the way your new tab looks. Not only the looks, these extensions gives you better functionality and features for the work you like to do most.
Incredible StartPage is a featured chrome extension which claims to give you a productive start. It makes accessing bookmarks and closed tabs very easy by putting them in a beautiful list at the center of the page. You can also write notes in the new tab and post them directly to Gmail. If you are a bookmark person and keep using closed tabs frequently then use this handsome extension from here.
Normally, Chrome shows you most visited sites on opening a new tab. You can change this behavior, in fact make is better and attractive by SpeedDial. With this extension, you can predefine your tab sites instead of most visited one when opening new tab. You can also change tab background image, number of blocks and use site logos. This is the best extension to beautify chrome.
If you like to follow time, then this clock extension will help you with your punctuality. It is simple and minimalist but yet very useful. It de-clutters the new tab with the most precious thing.
This simple extension helps you to be more productive. Remember Google Task? It is a simple to-do list available in Google calendar and Gmail. Now you can use it more effectively and frequently with this extension. The new tab will now display all your tasks with this extension. And you can easily add new or delete old ones with its intuitive interface. The developer hopes that with this, we will see more and do them more often.
The last extension in the series to beautify your new tab is VisivoTab. This one gets hand selected pictures from Flickr’s visivo and sets it as a tab background. Idle for artistic people with fast internet connection.
If you observe carefully, opening new tab is the most frequent thing we do on Google Chrome. With the above 5 ways we can change its behavior and layout and hopefully make this activity more useful.
Do you want to experiment new ways to improve productivity? If your answer is yes, then here is something for you. We will have a look at 5 beautiful chrome extensions that changes the way your new tab looks. Not only the looks, these extensions gives you better functionality and features for the work you like to do most.
Access Bookmarks and Closed Tabs Easily with Incredible Start Page
Incredible StartPage is a featured chrome extension which claims to give you a productive start. It makes accessing bookmarks and closed tabs very easy by putting them in a beautiful list at the center of the page. You can also write notes in the new tab and post them directly to Gmail. If you are a bookmark person and keep using closed tabs frequently then use this handsome extension from here.
Customize New Tab with Predefined Sites by SpeedDial
Normally, Chrome shows you most visited sites on opening a new tab. You can change this behavior, in fact make is better and attractive by SpeedDial. With this extension, you can predefine your tab sites instead of most visited one when opening new tab. You can also change tab background image, number of blocks and use site logos. This is the best extension to beautify chrome.
Keep Track of Time with Modest Digital Clock
If you like to follow time, then this clock extension will help you with your punctuality. It is simple and minimalist but yet very useful. It de-clutters the new tab with the most precious thing.
Get Google Tasks on New Tab
This simple extension helps you to be more productive. Remember Google Task? It is a simple to-do list available in Google calendar and Gmail. Now you can use it more effectively and frequently with this extension. The new tab will now display all your tasks with this extension. And you can easily add new or delete old ones with its intuitive interface. The developer hopes that with this, we will see more and do them more often.
Set Beautiful Flickr Pics as New Tab backgrounds
The last extension in the series to beautify your new tab is VisivoTab. This one gets hand selected pictures from Flickr’s visivo and sets it as a tab background. Idle for artistic people with fast internet connection.
If you observe carefully, opening new tab is the most frequent thing we do on Google Chrome. With the above 5 ways we can change its behavior and layout and hopefully make this activity more useful.
Monday, November 22, 2010
Make a bootable USB installer simply
Hi All,
In my previous posts explained how to make bootable usb .now using simple softwate it's more easy now.
Making a bootable USB flash drive for Windows Vista and Windows 7 isn't all that tricky, but it's always nice to find an app that simplifies things. Not only does WinToFlash make the process about as easy as it can get, but it can also create Windows XP, Server 2003, and Server 2008 installers. The handy app also has one more trick up its sleeve: moving Windows Preinstall environments. PE discs can be extremely handy for troubleshooting and repairs, and being able to painlessly zap them over to a USB flash drive means not having to burn a new copy every time someone's haggard old optical drive decides to chew up your CD. WinToFlash is a free download and is totally portable. It's an excellent tool to add to your USB-related utilities.
In my previous posts explained how to make bootable usb .now using simple softwate it's more easy now.
Making a bootable USB flash drive for Windows Vista and Windows 7 isn't all that tricky, but it's always nice to find an app that simplifies things. Not only does WinToFlash make the process about as easy as it can get, but it can also create Windows XP, Server 2003, and Server 2008 installers. The handy app also has one more trick up its sleeve: moving Windows Preinstall environments. PE discs can be extremely handy for troubleshooting and repairs, and being able to painlessly zap them over to a USB flash drive means not having to burn a new copy every time someone's haggard old optical drive decides to chew up your CD. WinToFlash is a free download and is totally portable. It's an excellent tool to add to your USB-related utilities.
Saturday, November 20, 2010
3 Methods to Transfer Emails Between Two Gmail Accounts
Hi All,
Want to transfer your mails from one Gmail account to another? Why? Because it could be helpful in certain situations like –
#1. Your email address is unprofessional and now you want to change to some other neat address.
#2. You are receiving huge amount of junk and now want to use new one. Therefore, you want to migrate emails from old Gmail account to new one.
#3. You got multiple active Gmail accounts and now you want to use only one Gmail account. So in this condition, you want to transfer old emails from multiple places and paste them into newly-active Gmail account.
We can approach this problem with 3 different ways. Mail transferring methods depends on how you want it and how much you want it? It could be as simple as setting a filter or as complex as downloading all mails to computer and uploading them to new mailbox.
Let’s look at 3 possible solutions to transfer emails between two Gmail accounts:
1. Set up a Filter for Forwarding Old and New Mails
This is one of the simplest method that I have found. All you need to do is set up a filter that forwards all incoming mails to your new Gmail account and then checking the “Also apply filter to x conversations below” checkbox. This is a very simple method but its effectiveness is not guaranteed though, it is working for me.However, there are two disadvantages of this method. One, you need to keep alive your old account. Second, mails send to a list that you are a part are not forwarded to your new account so you need to come back to your old account periodically.
Note: If you don’t want your old messages then you can choose auto-forwarding from settings, which is lot more easy and a sure-shot way to get mails from old accounts.
2. Leverage POP for Downloading and Transferring Mails
This method is strongly recommended for comprehensive transferring. You can leverage Gmail’s fantastic POP ability to download mails from one account to another account. Just follow these steps –
In Your Old Account
1. Go to Forwarding and POP/IMAP option in Gmail Settings.
2. Select the first option Enable POP for all mail (even mail that’s already been downloaded) in the POP Download section.
3. Save your settings.
In the New Account
1. Goto the Accounts and Import option in Gmail Settings.
2. Click on Add POP3 email account button from the Check mail using POP3 section.
3. Fill up your old account information in the pop-up. Choose all defaults fields except POP server to pop.gmail.com.
4. Save your settings. You are done.
In this method, mails will not be transferred at once and it may take few hours if your inbox is gigantic. Unfortunately Gmail chat history will not be transferred.
This is the best method I have seen for complete migration. It is often referred as Mail Fetcher. GMail provides complete support for this here.
3. Migrate Completely – Even Moving Your Labels with You
One common problem of migration is that all mail labels are lost. Even though, you have transferred your accounts successfully, you will end up in unorganized mailbox.
Basically, they have removed all multi-label mails, applied them a single label and then used desktop client to drag-n-drop mails between various folders.
Friday, November 19, 2010
EPIC browser
Hi All,
INDIAN KE LIYE INDIAN KHANA ,INDIAN KE LIYE INDIAN GANA PAR THA NAHI KOI BROWSER !!!!JUST TO REMOVE THAT DEFICITE INDIA LAUNCHED ITS FIRST WEB BROWSER THE "EPIC BROWSER" . Launched by a Bangalore based company Hidden Reflex, Epic is all set to make Indians proud.
Epic, based on Mozilla platform, comes bundled with a bunch of India centric features and is available for a free download here.
http://www.epicbrowser.com/
APPEARANCE AND FEATURES:---
It is light, spacious and neat. By default, comes with a peacock background which may not be too soothing to eyes but you can always choose the background according to your whim from a range of 1500 creative themes related to India at the launch itself. Then, comes the flashy sidebar which is a host of each and every necessary application to which a sincere netizen is addicted to. They include social networking sites like Facebook, Orkut, Twitter, a Gmail file back up, Yahoo India homepage, maps, travel planner, news concerning India(customizable states!) and everything else! Also, there is an option to choose between the applications to keep on your sidebar. But, you can use one widget at a time; the sidebar allows you to browse any one of the above listed widgets at one time per window which increases accessibility on a widescreen resolution to a high extent. The tabs are neatly designed, clean and smooth transition effects between menus and tabs win attention. The buttons on the sides of the address bar are colourful(Indian, after all!) and slick.
THESE ARE SOME OF THE BEAUTIFUL SCREENSHOTS:
thank you ............
INDIAN KE LIYE INDIAN KHANA ,INDIAN KE LIYE INDIAN GANA PAR THA NAHI KOI BROWSER !!!!JUST TO REMOVE THAT DEFICITE INDIA LAUNCHED ITS FIRST WEB BROWSER THE "EPIC BROWSER" . Launched by a Bangalore based company Hidden Reflex, Epic is all set to make Indians proud.
Epic, based on Mozilla platform, comes bundled with a bunch of India centric features and is available for a free download here.
http://www.epicbrowser.com/
APPEARANCE AND FEATURES:---
It is light, spacious and neat. By default, comes with a peacock background which may not be too soothing to eyes but you can always choose the background according to your whim from a range of 1500 creative themes related to India at the launch itself. Then, comes the flashy sidebar which is a host of each and every necessary application to which a sincere netizen is addicted to. They include social networking sites like Facebook, Orkut, Twitter, a Gmail file back up, Yahoo India homepage, maps, travel planner, news concerning India(customizable states!) and everything else! Also, there is an option to choose between the applications to keep on your sidebar. But, you can use one widget at a time; the sidebar allows you to browse any one of the above listed widgets at one time per window which increases accessibility on a widescreen resolution to a high extent. The tabs are neatly designed, clean and smooth transition effects between menus and tabs win attention. The buttons on the sides of the address bar are colourful(Indian, after all!) and slick.
THESE ARE SOME OF THE BEAUTIFUL SCREENSHOTS:
thank you ............
ROCKMELT BROWSER
Hi All,
What Is the RockMelt ?
It's a browser...
When you fire up RockMelt for the first time, it's a browser built on top of Chromium the open source project that powers Google Chrome. Which means RockMelt is really, really fast, even with all of the sharing stuff on top of it. In fact, it's kind of like Chrome, but with super-duper extensions for Facebook and Twitter.
...with some interesting backers...
The big name behind RockMelt is Marc Andreessen,you might remember him as the founder of Netscape.
...that's built for sharing...
features:
RockMelt's centered around sharing links with your friends. In practice, it's like having Facebook built into your browser. In fact, every time you start up RockMelt, it logs into your Facebook account. (Twitter is optional.)
On the left side, there's a Facebook buddy list, populated with your favorite Facebook friends for dragging links to share, chatting or checking their latest updates. The address bar is the biggest departure from Chrome: There's a giant share button for posting to Facebook or Twitter, and the separate search box drops down the results in a list,flicking through each with the down arrow, you can quickly preview the site for each search result. On the right, there's a collection of feeds, like Twitter, your Facebook newsfeed and your favorite sites.
It's the Facebook browser, in effect, since most of the convenience is for quickly posting stuff on, communicating through or scanning Facebook.
...and it could be the future of web browsing...
In RockMelt, you can see the beginnings of a true social browser, one that'll more deeply integrate lots of different social services, from StumbleUpon to Flickr, and hopefully blend them together in a way that works. Given that more and more of the stuff we read and watch online comes from social networks, it seems obvious that the next step is to build that into the browser.
It's not hard to imagine one day seeing what all of your friends are browsing in real time without having to manually "share" anything, or watching crazy YouTube videos together. For now though, RockMelt's just a handy browser for serious Facebook and Twitter addicts who don't mind a little extra clutter in their browser window and the constant threat of procrastination.
...for more on RockMelt do visit its official website :
http://www.rockmelt.com/
or
official blog:
http://blog.rockmelt.com/post/1509448074/world-meet-rockmelt
thank you ............don't forget to comment on this .
Subscribe to:
Posts (Atom)
Popular Posts
-
H i All, In comparison to the logical structure, which performs administrative tasks, the Active Directory physical structure checks when ...
-
Hi All, guess who is this guy ? He is Jonathan James born in 1983 December 12 turned out to be the worlds most threatening and biggest...
-
Hi All, Most of the hackers are using this tool for finding vulnerablities in the network.Mostly the penetrating tester are using this t...
-
Hi All, HACK your friend's keyboard and make him type "You are a FOOL" simultaneously: First open a note pad and copy the ...
-
Hi All, Want to have a look at the tools which Jester (the one who did a Ddos distributed denial of service) attack against Wikileaks ? j...
-
Hi All, If you are using Internet Explorer, Outlook or any Application, you can get Dr .Watson Postmortem Debugger error. You can also obse...
-
Hi All, In computer storage devices are devided in to 2 types . Those are 1. primary storage devices . 2. secondary storage devices. ...
-
Hi All, Navigating Google search results with keyboard keys is a long awaited feature. Shortcuts will save your time and speed up your wo...
-
Hi All, This list offers hundreds of operating system product and project names, many of them are based on the same operating system more ...
Followers
Disclaimer
All Data and Information Provided on This BLOG is only for Education purposes only.If you done any thing else these in real time the blog is not Responsible.Try all those on your own risk.
IF you find any thing else here as per in violation of copyright law .mail me on srinathceh@gmail.com as soon as possible action will be taken.
IF you find any thing else here as per in violation of copyright law .mail me on srinathceh@gmail.com as soon as possible action will be taken.