Dec 3, 2007

Manage your Google Alerts

Google Alerts are emails automatically sent to you when thee are new Google results for your search terms. We currently offer alerts with results from News, Web, Blogs, Video and Groups. You can manage up 1000 items.

Google Alerts currently offers 6 variations of alerts - 'News', 'Web', 'Blogs', 'Comprehensive', 'Video' and 'Groups'.

  • A 'News' alert is an email aggregate of the latest news articles that contain the search terms of your choice and appear in the top ten results of your Google News search.
  • A 'Web' alert is an email aggregate of the latest web pages that contain the search terms of your choice and appear in the top twenty results of your Google Web search.
  • A 'Blogs' alert is an email aggregate of the latest blog posts that contain the search terms of your choice and appear in the top ten results of your Google Blog search.
  • A 'Comprehensive' alert is an aggregate of the latest results from multiple sources (News, Web and Blogs) into a single email to provide maximum coverage on the topic of your choice.
  • A 'Video' alert is an email aggregate of the latest videos that contain the search terms of your choice and appear in the top ten results of your Google Video search.
  • A 'Groups' alert is an email aggregate of new posts that contain the search terms of your choice and appear in the top fifty results of your Google Groups search.

Google sends the email in three types there are - 'Once a week', 'once a day' and ' as it happens'

  • A 'once a week' (recommended) option can send emails automatically once a week for your search terms.
  • A 'once a day' (it can sends mail frequently mails of maximum results like bulk) option can send emails automatically once a day for your search terms.
  • A 'as it happens' option can sends the mails when it happens.It can sends more mail frequently mails of maximum results like bulk when compare with 'once a day'.

Nov 11, 2007

Edit your Blogs offline with Windows Live Writer

Edit your Blogs offline with Windows Live Writer

It is a really happy news to the Bolggers You can Edit Your blog in offline without Internet connection and It can Publish or POST on your blog after editing with Internet connection.

Step 1:

First download the latest version of the Windows Live Writer for the and Install in Your system. It also supports to WINDOWS XP, not only for Vista.

Step 2:

Before it you must connect to Internet. Run the application for the Program files-->Windows Live-->Windows live write

It shows the following Wizard.only on first use

Form the above image You can select the Weblog providers like (, Windows Live Space, and other service).It shows the default Weblog service is WINDOWS LIVE SPACE Your are not the Windows space Blogger select the ANOTHER WEBLOG SERVICE OPTION AND CLICK NEXT BUTTON.

After that it shows the following window.

From the above window You can view the Options of

Weblog Homepage URL: (Your blog Url Ex:

Username:(Your Username) and

Password: (Your Password).

Entire all options and click the NEXT BUTTON. After that the process is connecting to your blog.

NOTE: Mostly this process is down. Some times in 56kbsec dial-up or slow Internet connections or error you can try it 2-3 times. or it can ask the conforming another window

Select providers: select your blog providers from the following (list shows Blogger, typepad and More... select which we want)

Remote Posting URL for your Weblog: default shows the following URL for users.<feed-id>/posts/full

on the above you can entire <Feed-ID> like this "1234567890123456" you can find your feed ID by open Your blog -->right click on the page -->select view page information there you can find your blog ID. This process is not sure to success connect. Try it better.

And it shows the following window when connection is success connected. It is one time process after the first time install of WLW.

After that You can download your blog style by clicking Weblog option in the top of the window-->click Edit Weblog settings-->click Editing option and click update style button. It can updates your blog template style which you which you can used on blog Template.And we can View in web layout format.

After that you can disconnect the Internet connection and edit multiple postings in offline and it can save in local draft by clicking CTRL+L or selecting File menu in top of window-->Save Local Draft. after that you can post your postings by connect to the Internet and click CTRL+SHIFT+P and select File--> Post Draft to Weblog for draft your post in your blog.

Read more..

Oct 30, 2007

Creating Your Own Newsletter subscription/Unsubscription with PHP/MYSQL

You really need only one field in the subscribers table: to hold the email address of the user. However, you should have an ID field just for consistency among your tables, and also because referencing an ID is a lot simpler than referencing a long email address in where clauses. So, in this case, your MySQL query would look something like

mysql> create table subscribers (
    -> id int not null primary key auto_increment,
    -> email varchar (150) unique not null
    -> );
Query OK, 0 rows affected (0.00 sec)

Note the use of unique in the field definition for email. This means that although id is the primary key, duplicates should not be allowed in the email field either. The email field is a unique key, and id is the primary key.

This relationship is represented in the table information as MUL (or "multiple") in the Key field:

mysql> describe subscribers;
| Field | Type         | Null | Key | Default | Extra          |
| id    | int(11)      |      | PRI | NULL    | auto_increment |
| email | varchar(150) | YES  | MUL | NULL    |                |
2 rows in set (0.00 sec)

Now that you have a table, you can create the form and script that place values in there.

Creating the Subscription Form

The subscription form will actually be an all-in-one form and script called manage.php, which will handle both subscribe and unsubscribe requests shows the code for manage.php, which uses a few user-defined functions to eliminate repetitious code.

Listing 18.1 Subscribe and
Unsubscribe with manage.php

  1: <?php

  2: //set up a couple of functions

  3: function doDB() {

  4:     global $conn;

  5:    //connect to server and select database; you may need it

  6:    $conn = mysql_connect("localhost", "joeuser", "somepass")

  7:         or die(mysql_error());

  8:    mysql_select_db("testDB",$conn) or die(mysql_error());

  9: }


 11: function emailChecker($email) {

 12:     global $conn, $check_result;

 13:    //check that email is not already in list

 14:    $check = "select id from subscribers where email = '$email'";

 15:    $check_result = mysql_query($check,$conn) or die(mysql_error());

 16: }


 18: //determine if they need to see the form or not

 19: if ($_POST[op] != "ds") {

 20:    //they do, so create form block

 21:    $display_block = "

 22:    <form method=POST action=\"$_SERVER[PHP_SELF]\">


 24:    <p><strong>Your E-Mail Address:</strong><br>

 25:    <input type=text name=\"email\" size=40 maxlength=150>


 27:    <p><strong>Action:</strong><br>

 28:    <input type=radio name=\"action\" value=\"sub\" checked> subscribe

 29:    <input type=radio name=\"action\" value=\"unsub\"> unsubscribe


 31:    <input type=\"hidden\" name=\"op\" value=\"ds\">


 33:    <p><input type=submit name=\"submit\" value=\"Submit Form\"></p>

 34:    </form>";


 36: } else if (($_POST[op] == "ds") && ($_POST[action] == "sub")) {

 37:    //trying to subscribe; validate email address

 38:    if ($_POST[email] == "") {

 39:        header("Location: manage.php");

 40:        exit;

 41:    }

 42:    //connect to database

 43:    doDB();

 44:    //check that email is in list

 45:    emailChecker($_POST[email]);


 47:    //get number of results and do action

 48:    if (mysql_num_rows($check_result) < 1) {

 49:        //add record

 50:        $sql = "insert into subscribers values('', '$_POST[email]')";

 51:        $result = mysql_query($sql,$conn) or die(mysql_error());

 52:        $display_block = "<P>Thanks for signing up!</P>";

 53:    } else {

 54:        //print failure message

 55:        $display_block = "<P>You're already subscribed!</P>";

 56:    }

 57: } else if (($_POST[op] == "ds") && ($_POST[action] == "unsub")) {

 58:    //trying to unsubscribe; validate email address

 59:    if ($_POST[email] == "") {

 60:    header("Location: manage.php");

 61:        exit;

 62:    }

 63:    //connect to database

 64:    doDB();

 65:    //check that email is in list

 66:    emailChecker($_POST[email]);


 68:    //get number of results and do action

 69:    if (mysql_num_rows($check_result) < 1) {

 70:        //print failure message

 71:        $display_block = "<P>Couldn't find your address!</P>

 72:        <P>No action was taken.</P>";

 73:    } else {

 74:        //unsubscribe the address

 75:        $id = mysql_result($check_result, 0, "id");

 76:        $sql = "delete from subscribers where id = '$id'";

 77:        $result = mysql_query($sql,$conn) or die(mysql_error());

 78:        $display_block = "<P>You're unsubscribed!</p>";

 79:    }

 80: }

 81: ?>

 82: <HTML>

 83: <HEAD>

 84: <TITLE>Subscribe/Unsubscribe</TITLE>

 85: </HEAD>

 86: <BODY>

 87: <h1>Subscribe/Unsubscribe</h1>

 88: <?php echo "$display_block"; ?>

 89: </BODY>

 90: </HTML>

may be long, but it's not complicated. In fact, it could be longer, were it not for the user-defined functions at the top of the script. One of the reasons for creating your own functions is that you know you will be reusing a bit of code and don't want to continually retype it. Lines 3–9 set up the first function, doDB(), which is simply the database connection you've been making in your lessons for a while now. Lines 11–16 define a function called emailChecker(), which takes an input and returns an output—like most functions do. We'll look at this one in the context of the script, as we get to it.

Line 19 starts the main logic of the script. Because this script performs several actions, we need to determine which action it is currently attempting. If the value of $_POST[op] is not "ds", we know the user has not submitted the form; therefore, we must show it to the user. Lines 21–34 create the subscribe/unsubscribe form, using $_SERVER[PHP_SELF] as the action (line 22), creating a text field called email for the user's email address, and setting up a set of radio buttons (lines 28–29) to find the desired task. At this point, the script breaks out of the if...else construct, skips down to line 82, and proceeds to print the HTML. The form is displayed as shown in below

If the value of $_POST[op] is indeed "ds", however, we need to do something. We have two possibilities: subscribe and unsubscribe. We determine which action to take by looking at the value of $_POST[action]—the radio button group.

In line 36, if $_POST[op] is "ds" and $_POST[action] is "sub", we know the user is trying to subscribe. To subscribe, he will need an email address, so we check for one in lines 38–41. If no address is present, the user is sent back to the form.

If an address is present, we call the doDB() function in line 43 to connect to the database because we need to perform a query (or two). In line 45, we call the second of our user-defined functions, emailChecker(). This function takes an input ($_POST[email]) and processes it. If we look back to lines 12–15, we see that the function is checking for an id value in the subscribers table that matches the value of the input. The function then returns the resultset, $check_result, for use within the larger script.

Note: the definition of global variables at the beginning of both user-defined functions in figures. These variables need to be shared with the entire script, and so are declared global.

Jump down to line 48 to see how $check_result is used: The number of records in $check_result is counted to determine whether the email address already exists in the table. If the number of rows is less than 1, the address is not in the list, and it can be added. The record is added and the response is stored in lines 50–52, and the failure message (if the address is already in the table) is stored in line 55. At that point, the script breaks out of the if...else construct, skips down to line 82, and proceeds to print the HTML. You'll test this functionality later.

The last combination of inputs occurs if the value of $_POST[op] is "ds" and $_POST[action] is "unsub". In this case, the user is trying to unsubscribe. To unsubscribe, he will need an email address, so we check for one in lines 59–61. If no address is present, the user is sent back to the form.

If an address is present, we call the doDB() function in line 64 to connect to the database. Then, in line 66, we call emailChecker(), which again will return the resultset, $check_result. The number of records in the resultset is counted in line 69, to determine whether the email address already exists in the table. If the number of rows is less than 1, the address is not in the list, and it cannot be unsubscribed. In this case, the response message is stored in lines 71–72. The user is unsubscribed(the record deleted) and the response is stored in lines 75–77, and the failure message (if the address is already in the table) is stored in line 78. At that point, the script breaks out of the if...else construct, skips down to line 82, and proceeds to print the HTML.

Below figures show the various results of the coded script, depending on the actions selected and the status of email addresses in the database

Developing the Mailing Mechanism

With the subscription mechanism in place, you can create a basic form interface for a script that will take the contents of your form and send it to every address in your subscribers table. This is another one of those all-in-one scripts, called sendmymail.php, and it is shown in above

Listing Send Mail to Your List of Subscribers

>Listing 18.2 Send Mail to
Your List of Subscribers

  1: <?php

  2: if ($_POST[op] != "send") {

  3:    //haven't seen the form, so show it

  4:    print "

  5:    <HTML>

  6:    <HEAD>

  7:    <TITLE>Send a Newsletter</TITLE>

  8:    </HEAD>

  9:    <BODY>

 10:    <h1>Send a Newsletter</h1>

 11:    <form method=\"post\" action=\"$_SERVER[PHP_SELF]\">

 12:    <P><strong>Subject:</strong><br>

 13:    <input type=\"text\" name=\"subject\" size=30></p>

 14:    <P><strong>Mail Body:</strong><br>

 15:    <textarea name=\"message\" cols=50 rows=10 wrap=virtual></textarea>

 16:    <input type=\"hidden\" name=\"op\" value=\"send\">

 17:    <p><input type=\"submit\" name=\"submit\" value=\"Send It\"></p>

 18:    </FORM>

 19:    </BODY>

 20:    </HTML>";


 22: } else if ($_POST[op] == "send") {

 23:     //want to send form, so check for required fields

 24:     if (($_POST[subject] =="") || ($_POST[message] == "")) {

 25:        header("Location: sendmymail.php");

 26:        exit;

 27:    }


 29:    //connect to database

 30:    $conn = mysql_connect("localhost", "joeuser", "somepass")

 31:         or die(mysql_error());

 32:    mysql_select_db("testDB",$conn) or die(mysql_error());


 34:    //get emails from subscribers list

 35:    $sql = "select email from subscribers";

 36:    $result = mysql_query($sql,$conn) or die(mysql_error());


 38:    //create a From: mailheader

 39:    $headers = "From: Your Mailing List <>\n";


 41:    //loop through results and send mail

 42:    while ($row = mysql_fetch_array($result)) {

 43:        set_time_limit(0);

 44:        $email = $row['email'];

 45:        mail("$email", stripslashes($_POST[subject]),

 46:             stripslashes($_POST[message]), $headers);

 47:        print "newsletter sent to: $email<br>";

 48:    }

 49: }
The main logic of the script starts right there at line 2, where we determine whether the user has seen the form yet. If the value of $_POST[op] is not "send", we know the user has not submitted the form; therefore, we must show it to her. Lines 4–20 create the form for sending the newsletter, which uses $_SERVER[PHP_SELF] as the action (line 11), creates a text field called subject for the subject of the mail, and creates a textarea called message for the body of the mail to be sent. At this point, thescript breaks out of the if...else construct and the HTML is printed. The form is displayed as in

If the value of $_POST[op] is indeed "send", however, we have to send the form to the recipients. Before we send, we must check for the two required items: $_POST[subject] and $_POST[message]. If either of these items is not present, the user is redirected to the form again.

If the required items are present, the script moves on to lines 30–32, which connect to the database. The query is issued in line 36, which grabs all the email addresses from the subscribers table. There is no order to these results, although you could throw an order by clause in there if you want to send them out in alphabetical order.

Line 39 creates a From: mail header, which is used inside the upcoming while loop, when mail is sent. This header ensures that the mail looks like it is from a person and not a machine. The while loop, which begins on line 42, extracts the email addresses from the resultset one at a time. On line 43, we use the set_time_limit() function to set the time limit to 0, or "no limit." Doing so allows the script to run for as long as it needs to.

Note: Because all the script is execute the mail() function numerous times, it does not take into account the queuing factors in actual mailing list software, which are designed to ease the burden on your outgoing mail server. Using set_time_limit() does not ease its burden; it just allows the script to continue to run when it might have timed out before.

In line 45, the mail is sent using the mail() function, inserting the values from the form where appropriate. Line 46 prints a message to the screen for you, to show who should have received the mail.You can see the outcome of the script.

Note: It is not created by me it is collected by the Sams Teach yourself book, and any problem by this code I and the Blog is not response but it is tested by me no problem enjoy the codes. Any article or other is like same which is copyright Please don’t take any action

Read more..

Increase Your Google Adsense earning by place ads on page

There are mainly two things to increase the Google Adsense earning.

1. First thing are which ads formats gets more earn.
The ‘text linked’ format ads are better then the ‘text and image’ ads and the ‘text and image’ ads is better the image ads.

2. And the second thing is where the ads place in the Website and in Blog.
Most of the peoples in the net see on the left side of the website.

In Website:

  • First-of-all Insert Google Search service in your website on top-right of the webpage.
  • So we can put 120x60 or 120x90 or related size ‘Text linked’ format ads below the Navigate-bar
  • Insert ‘text and image’ format ads in the bottom of the webpage as you like size (450x90,700x90 or other).
  • Insert 250x250 size ‘Text and Image’ ads in right side on your post.

In Blog:

We can select the Blog templates which have the Profile and posts archive list is left side of the Blog. Because most of the people can see left side of the webpage.

  • Insert Google search in Top of Profile or posts archive left-side of the Blog.
  • Insert 120x60 or related size ‘Text linked’ formatted ads in below the Posts archive.
  • Insert 300x200 or like size in top of postings and bottom of the postings like shown on my present Blog.

Your not have the Google adsense Justregister Fallow
Read more..

Oct 8, 2007

Increase Your Website or Blog traffic

Increase Your Website or Blog traffic

Web traffic is the main success for the webmasters for that you must increase the web traffic for your site

1. Step: Submit Your URL address to search engines:

First step to increase the web or blog traffic by submitting Your URL(web or blog address) to the search engines like Google, Yahoo, MSN

Submit Your URL links bu the below links




And for more about 40 search engines submit to he following site

And more sites search on Google or yahoo by fallow “URL submit +websites” or “URL submit +forum” and more

And also submit u the directories like yahoo dir,

Google àmore optionsà Directory but some amount is spend for that

Try site is the free service directory to the website. I don’t know about this site.

2. Coding the Meta tags on the webpage:

Meta tags are the important and main feature for the websites. Because when the user given the keyword for search result the search engines search in Meta tags of the WebPages in websites.

Meta tags are easy to create following the code:

Title of Your Site

3. Step: Creating RSS or ATOM feeds and Newsletter subscription:

Newsletter subscription is another important feature to the website. From this the visitors and your customers become upto-date with your website.

You can create your own Newsletter subscription page. You have just basic knowledge on the Scripting like PHP, and DATABASE like MYSQL for best practice visit the site àdocumentation for the documentation or follow the code (it is not created by me it is collected form the sams teach yourself PHP,MYSQL and apache on online).


To create newsletter service is easy by visiting the third-party On the site create a account on the site and copy the code which is given by that and past it on your blog or website. And You can see like below

When the user entire E-mail address in the form he can receive the newsletters from your site with the help or involving the third party (

Another thing is create feeds. Form this visitor or customer become upto-date with your site.

It is also a simple to create by visiting third-party just register on the site copy the code which it was given and past the code your webpage. The users have direct service with this site settingsà feed and fallow the steps.

4. Step: Submitting the article to the popular article sites

One of the best steps is submitting the article to the popular article sites like,,, is the best article submitting site but some little amount is spend for that. It submits to 1000’s of sites and publishers and more. is the best free article publishing site you can submit your article to this site. It has high range traffic.

You want to spend a little amount for your web traffic try better advertise on low cost sites. For best example is spend money advertise your site on Google adwords.

5. Step: Posting on forum and create your own forum:

It is also a best step to post the articles in the forums like Orkut because it as a very high traffic and lakes of people visits the site.

It is good think when compare with posting on another forum is creating your own forum in your website. It is very useful for online support for your customers and the visitors. From this you can get the rich quality and good amount of traffic.

6. Tell-A-Friend or family (TAF):

Tell a friend or family is the best and free way to increase the web traffic. For creating the TAF you have the Basic knowledge on Scripts and DATABASE like PHP and MYSQL. PHP is the best scripting language and you want best practice visit the àdocuments. It is a free online documentation.

7. Step: Link Exchange:

Link exchange free and little best and free. It means you can exchange the links with another sites. Your link is on another site and another site link (Which your site link is on another site) is in your site. For best result search “Link exchange +web”, “link exchange + forum”.

Oct 2, 2007

Firefox-recover Your Browser without reinstall

Firefox-recover Your Browser without reinstall

Without Firefox You don't live on internet.But firefox becomes slowdown and raises the errors When you try to recover the firefox you can disenable the all the ADD-IN clear the catches and more. But there is a trick recover u r firefox in fallow by 2 steps Step 1: Backup Your Book makes Step 2: Click Run Option on Start menu Type ("c:\Program files\Mozilla Firefox\Firefox.exe"-P) a window is open on the window click Create Profile option and name the profile after creating the name to profile select u created profile and click the star option in the u can see the recovered browser.It is a new browser like newly installed and lastly import the Bok Makes and Liver in Internet with Firefox

Sep 23, 2007

Create Your Own PDF Files and Documents

Create Your Own PDF Files and Documents

It is good news for who are waiting for create PDF Documents. Just download the software name PDFcreator from site

and install. Type a document on any word process application like MS word, Notepad, Openoffice word any and just click print option it will displays first time u r printer option when u have printer change it in to PDFcreator and click ok it display General author information to edit and save it in u r system. I’m using many softwares to do it but do not have clarity on document and some do not accept images, some r print as very large font. Ok enjoy the feature

Read more..

Sep 13, 2007

Threats on Internet (Cyber Hygiene)

Threats on Internet (Cyber Hygiene)

Threats on Internet, operation System update, Anti-Virus software’s Installation, Personal firewall, Pop-up blocking, Spy ware removal tools.

Types of Internet threats:

  • Viruses
  • Network worms
  • Trojans
  • Spyware / Adware
  • Other Malware
  • Other Threats

Viruses, worms and Trojan horses:

A virus is a program that replicates itself, usually by attaching itself to other files and program. A worm is a program that does not infect other programs but makes copies of itself. Trojan horse programs do not replicate nor make copies of themselves, but rely on other “manual” method of distribution. We use the term “Virus” on this page to cover all forms of infections.

Virus are spread in a variety of ways. Some Examples:

  • Email attachments (such as klez, Badtrans, myparty)
  • Instant messages links and attachments (such as Aplore)
  • Compromised web services (such as Nimda)
  • Usenet news groups
  • Internet relay Chart channels
  • Floppy diskettes
  • File downloads (many backdoor Trojans are embedded with other files)

All viruses are different. Some activate on a certain day, but remain dormant until then. Others being the attack as soon as the machine has been infected. Viruses can be very damaging and some are just annoying.

More than 1,00,000 known viruses exists in the world today several hundred new

Viruses are discovered every month

Protecting from viruses:

A good way to protect yourself is to have virus protection program and keep it up-to-date. Before running a download from an unknown site, or opening an email attachment, always be sure to scan it to ensure that it is not infected. If you do not know that source of a file does not open it. Even it you know the person who sent you a file, if you were not expecting it you may want to contact them before opening it. This is because many viruses automatically send themselves out to addresses it finds in file on the infect computer.

Anti-Virus program:

An anti-virus program designed to protect your computer from possible viruses infection. Most viruses are designed to operate in the background in a that the user will not notice. Virus protection program search for, detect, and attempt to remove these viruses. Anti-virus program must be kept upto date in order for them to provide adequate protuction. New viruses are being created every day and your antivirus program can’t always predict what they will be able todo or how they will work.

Due to the nature of the operating system, Linux, and other UNIEX-kinks operating system are not as susceptible to viruses. Thus an anti-virus program is not necessary.

Network Word:

  • Self-replicating Viruses that residw in the active memory of a computer.
  • Worms send themselves out to the Internet from infected system.
  • Either include tiny e-mail servers or search for unprotected shared network

Trojan Programs:

  • Programs that installed themselves stealthly via Internet & provide access for malicious use
  • Threats enabled by (/through) Trojans
    • DDos attacks
    • Data stealing
    • Distributed spam emails
  • Do not replicate

Spyware / Adware:

  • Cookies-Track you online
  • Browser Hijackers-Changes default home page
  • Tracking Cookies-Gathers info of web usage
  • Trickles-Reinstalls spyware when dected
  • Keyloggers-Records anything you type….Etc,.

Other malware:

  • Dos & DDos attacks
  • Flooders
  • FilwCryptors & poluCryptors
  • Nukers …Etc.

Other Threats:

  • Phishing
    • Confidential information stealing by fraud emails & web sites (author falsified)
    • Several millions of phishingg messages have been sent world wide
    • Fastes growing threat today
  • SPIM
    • Instant message SPAM
    • Estimated: 4 billion Spam’s during 2004

Diagnosing (or) Detecting Infections:

  • Slow computer, System reboots
  • Mouse moves by itself
  • Browser goes to unexpected web sites
  • Slow internet access
  • Endless popup ads
  • New desktop toolbars


  • Disabled antivirus scanner or firewall
  • Check startup programs groups regulation for software you didn’t install
  • Add/Remove programs for software’s you didn’t install (make a list of install items on a new machine and check the list regularly)
  • Check running services monthly
  • Check running processes in task manage
  • Monitor open ports
  • Monitor outgoing and incoming connections.

Methods against Threats:

  • Updating
  • Antivirus software’s
  • Antispyware Tools

Aug 31, 2007

20 things you didn't know about Windows XP

20 things you didn't know about Windows XP

You've read the reviews and digested the key feature enhancements and operational changes. Now it's time to delve a bit deeper and uncover some of Windows XP's secrets. 1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only). 2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run... and type 'gpedit.msc'; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care -- some may stop your computer behaving as you wish. (Professional Edition only). 3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll,LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same. 4. XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable. 5. For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options -- they're all far too baroque to go into here. 6. XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother. 7. You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system. 8. XP will treat Zip files like folders, which is nice if you've got a fast machine. On slower machines, you can make XP leave zip files well alone by typing 'regsvr32 /u zipfldr.dll' at the command line. If you change your mind later, you can put things back as they were by typing 'regsvr32 zipfldr.dll'. 9. XP has ClearType -- Microsoft's anti-aliasing font display technology -- but doesn't have it enabled by default. It's well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2. 10. You can use Remote Assistance to help a friend who's using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like Replace this with your chum's real IP address -- they can find this out by going to -- and get them to make sure that they've got port 3389 open on their firewall and forwarded to the errant computer. 11. You can run a program as a different user without logging out and back in again. Right click the icon, select Run As... and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects. 12. Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might slip the bonds of sanity before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0. 13. You can start up without needing to enter a user name or password. Select Run... from the start menu and type 'control userpasswords2', which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatically Log On dialog box will appear; enter the user name and password for the account you want to use. 14. Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options... and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed. 15. XP comes with a free Network Activity Light, just in case you can't see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You'll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic. 16. The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0. 17. You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By... Show In Groups. 18. Windows Media Player will display the cover art for albums as it plays the tracks -- if it found the picture on the Internet when you copied the tracks from the CD. If it didn't, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it. 19. Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons.

Missing Folder Option on the Tools Menu

Missing Folder Option on the Tools Menu

It is one of the major problems on the PC aced by the More People

It is solved by downloading the NOD32 Antivirus software it is the best software to

Recover and remove the Folder option software some times it is unable to fix the

problem try NOD32 2.1 FIX. And Enjoy………

[NOTE: NOD32 is not Freeware software and u can try trial Versions]

Aug 25, 2007

Recover PC by Backup after completeing installation of OS and Mother bord

Recover PC by Backup after completeing installation of OS and Mother bord

Hi Friends, all my friend take time wast to install os when it is infected or any very borry and take long time there is a way to recover u r PC by the software Gost (it is NorthernProvided ). Download it from the northern install and carfully read the Tutorials of the software. and follow the instructions it will backup the data to directly to the CD (it is used by me it is backup data of 4gb to one cd) the gost program and fallow the instructions finally it will finish it will restart and open in DOS mode (PC DOS gost DOS) this type of dos is not support to the all PC. 2.After completing the backup it will normally restarts and open u r original windows. 3.fro troubleshooting carfully read the Tutorials given by GOST. [NOTE:i for got it will backup ur OS drive in 5min and it will restores less then backup and donot need to install motherboard again and also u installed programs]
Recover from Drive not open in double click

Recover from Drive not open in double click

Now a days in computer drives ar not open in double click and it will open on right click explore it can solved by many methods and fallow the code This BATCH file program that removes AUTORUN.INF file from the infected computers. A virus or worm creats this file in a root of a drive so that when ever the drive is opened the virus or worm is ran. Here is a simple code to remove it: (start copying from the next line down): cd\ c: attrib -r -s -h autorun.inf del autorun.inf d: attrib -r -s -h autorun.inf del autorun.inf e: attrib -r -s -h autorun.inf del autorun.inf f: attrib -r -s -h autorun.inf del autorun.inf g: attrib -r -s -h autorun.inf del autorun.inf h: attrib -r -s -h autorun.inf del autorun.inf i: attrib -r -s -h autorun.inf del autorun.inf j: attrib -r -s -h autorun.inf del autorun.inf k: attrib -r -s -h autorun.inf del autorun.inf l: attrib -r -s -h autorun.inf del autorun.inf m: attrib -r -s -h autorun.inf del autorun.inf n: attrib -r -s -h autorun.inf del autorun.inf o: attrib -r -s -h autorun.inf del autorun.inf p: attrib -r -s -h autorun.inf del autorun.inf q: attrib -r -s -h autorun.inf del autorun.inf r: attrib -r -s -h autorun.inf del autorun.inf s: attrib -r -s -h autorun.inf del autorun.inf t: attrib -r -s -h autorun.inf del autorun.inf u: attrib -r -s -h autorun.inf del autorun.inf v: attrib -r -s -h autorun.inf del autorun.inf w: attrib -r -s -h autorun.inf del autorun.inf x: attrib -r -s -h autorun.inf del autorun.inf y: attrib -r -s -h autorun.inf del autorun.inf z: attrib -r -s -h autorun.inf del autorun.inf copy this in a NOTEPAD file, then save the notepad file as : "file.bat" and then run it to remove all the rubbish of autorun copy from "CD\" to "del AUTORUN.INF" and added drive letter are for some computers using memory card readers or removable disks. or several harddrives. well....... i hope this solve the problem....... its fast and relaiable ... your problem will be fixed after you run that bat file RESTART (COpied) If the above trick is not working. Just download the anti_autorun.exe(108kb) and run in your local PC it will remove 32 typpes and formates of autorun threads. If it is also not work try in your own ways and send to me.


Good trick (Try This 1 with ur Winamp) When ur Winamp is active try to do given below! Just type! (u can’t read what ur typing therefore just type) The skincheat is a little easter egg in Winamp. To activate it type Nullsoft (with Esc after each "l" to close the dialog) while the Winamp window is active. Now the title bar of the main window changes into another. What appears now the skinner decides. Typically it is a text, short information about the skinner or something else. If you do the skincheat and the Winamp default skin is loaded this text appears: "it really whips the llamas ass". Try this with your other skins.



It is Really send by my friend (The Black Knight)


Now a days a new virus( worm ) is getting access to the systems by bypassing the ANTIVIRUS..... The effect of the worm is like this,... >> U will get header like TAGA ESTI MARUNDIKI MUBHAY!!!-BY S.NICHOLOS or MABUHAY ESTI MARINDUQUE! BY: Nicklaus S. Buñag when-ever U will open ur internet explorer...

>> Also the system-drives ( C:, D:, E: or F: etc... ) will not open on double click... >> By Right-clicking on the drives U will get AutoPlay opyion instead of OPEN option.....

Hi, I've suffered with the same problem n I've tesed it with a lot of anti-virus... Best use NOD32 to cleanup it... It was the only software which was able to detect the worm ( its a maskrider worm ) Well if U don't have then U can also delete it manually.... Follow the steps... ( exactly as I am telling ) 1. Go to safe mode ( I think U know how to ) 2. Go to your own user mode n not as Administrator. 3. RUN > regedit ( Press enter ) 4. Navigate to : HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\ then in the left pannel U will find a key named "maskrider", delete this key. 5. Now just click on "HKEY_CURRENT_USER". 6. Press Ctrl + F to open the find option in the registry... 7. Write maskrider n click on Find Next. 8. U will get 4-5 times ( may be more than that ) the find result, delete the key that contains the "maskrider" option from the registry. ( When U will get the key is under some AutoRun option delete the whole AutoRun from Registry. ) 9. Now go to HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\ Delete the key named "Window Title"... ( in the left pannel ) 10. Now close the Registry. 11. Open the C: Drive. 12. RUN > cmd ( Press enter ) 13. cd C:\ ( Press enter ) 14. attrib -r -h -a -s ( Press enter ) 15. In the C: Drive U will get a lot of files suddenly opens up, Just delete the files named maskrider2001.vbs and AutoRun.inf. ( DON't mesh with any of those other files without knowing what they do !!! It will simply CRASH ur system !!! ) 16. attrib +r +h +a +s ( Press enter ) 17. Now U have to do the same method for each drive U have, like U have 4 drives, C: D: E: & F:, then each time open the corresponding Folder n do the same cmd commands n delete the maskrider2001.vbs and AutoRun.inf It will surely correct ur all problems after the system restart,... Tell me it worked or not ( feedback )...
Your Ad Here