Wednesday, August 31, 2011

ADS COMPLETE INFORMATION

Click On The Below Given Link And Download The File

ADS LAB MANUAL PART-1

ADS LAB MANUAL PART-2

ADS COMPLETE NOTES

Animated Tutorial On C

Click On The Given Below Link To Download

Animated Tutorial On C

After unzipping The File open The Main_01 file to open tutorial

Jntu E-Books Daily Updates

Technology Tips and Tricks


Play Movie in mspaint

Step 1. play video on Desktop........ press Print Screen/SysRq key button while playing 

Step 2. Next open Pbrush(mspaint)

Step 3.press Cntrl+V in mspaint

thats it

 

 

Deleting autorun.inf



Guyzzzzzz............... fed up with autorun.inf..... is it been a uncalled relative in ur drive...... I have a solution hope so some of u know but its for them whome it may help................
yup ...... 1.Insert the drive 2.Press cntrl+shift+esc(task manager) 3.click the process sub tab 4.Find the explorer.exe 5.Right click on it end process tree
6.Then in task manager click File under that click New task(Run..) there type cmd press enter
7.In command type the Drive Letter(ex: C,D,E,F,G) press enter
8.then type Del autorun.inf press enter
9.md autorun.inf press enter
10.Then again in task manager click File under that click New task(Run..) there type explorer.exe press enter
thats it guyssssssssss really worksss.................. I used md autorun.inf b'coz giving lyk dat same filename doesn't exists in the same drive

 

 

STILL CONFUSED ON WHICH ANTI SPYWARE SOFTWARE TO USE.....LET ME HELP YOU OUT.
___________________________________________________
Some of the reliable anti spyware softwares are as follows:

1.WEBROOT SOFTWARE SPY SWEEPER:This is undoubtedly the leader today in effectively scanning and removing your PC of all the malicious spywar,trojans,adware etc.

Get it at
http://www.download.com/Webroot-Spy-...-10562248.html

2.PC TOOLS SPYWARE DOCTOR:This is the runner up,very close with the winner.
In the very latest testing, Spy Sweeper is slightly better at removing spyware from a test system. But in many reviews, Spyware Doctor finishes almost dead even with Spy Sweeper. Reviews say Spyware Doctor is a sophisticated spyware remover tool with an excellent user interface.

Get it at http://www.download.com/Spyware-Doct...-10562289.html

3.LAVASOFT AD AWARE SE PERSONAL:This one is for FREE.Wow this sounds great!!!!The well- respected Ad-Aware SE Personal beats the competing Spybot Search & Destroy in tests. Ad-Aware Personal doesn't offer real-time protection or scheduled system scans, but it makes an excellent supplement to your primary anti-spyware software program.A must download for everybody.

Get it FREE at
http://www.lavasoft.com/

4.MICROSOFT WINDOWS DEFEDER BETA 2:Hey this is FREE again.Formerly called Microsoft Anti-Spyware, Windows Defender is still in testing phases, though it is available to anyone for free. Microsoft will be including this anti-spyware program in the upcoming Windows Vista operating system, scheduled for release in early 2007.A must get bargain for anyone for free.

Get it FREE at
http://www.microsoft.com/downloads/d...displaylang=en
OR
http://www.download.com/Microsoft-Wi...ml?tag=lst-0-1

5.ALURIA ANTI SPYWARE 4.0:Aluria Anti-Spyware 4.0 also gives you real-time tracking and blocking capabilities, allowing you to prevent spyware from entering your computer in the first place.Aluria Anti-Spyware also offers automatic updates, spyware severity, descriptions of spyware found and more.

Get it at
http://www.aluriasoftware.com/

These Softwares are the Leaders in effective spyware removal detection and elimination.There are various other options available on the net today but I recommmend that you use one of the above.


 

 

 

Magic With Javascript





Magic With Javascript

Goto any website with pictures showing, even this page will do. It works for Opera as well.
Just copy and paste the following into the address bar:


CODE
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}se tInterval('A()',50); void(0);


See the magic

Values can also be changed:

CODE
java script:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200;
DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*1+i*x2+x3)*x1+x2)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}se tInterval('A()',50); void(0);

 

 

500 word Glossary of a computer





This500 word Glossary cover all the major peripherals of computer,i/o devices,Networking and Tele Communication
A
adapter Also known as an add-on card, controller, expansion card, or I/O card. Adapters are installed in expansion slots to enhance the processing power of the computer or to communicate with other devices. Examples of adapters include asynchronous communication, floppy disk-controller, and expanded memory.

address A unique memory location permitting reading or writing of data to/from that location. Network interface cards and CPUs often use shared addresses in RAM to move data between programs.

analog-to-digital converter (ADC) A device that converts analog input signals to digital output signals used to represent the amplitude of the original signal.

application software A computer program designed to help people perform a certain type of work. An application can manipulate text, numbers, graphics, or a combination of elements. Some application packages focus on a single task and offer greater computer power while others, called integrated software, offer less power but include several applications, such as word processing, spreadsheet, and database programs. An application may also be referred to as software, program, instructions, or task. See also software

areal density The amount of data that can be stored in one area of a disk-hard or floppy.

ASCII (American Standard Code for Information Interchange) The data alphabet used in the IBM PC to determine the composition of the 7-bit string of 0s and 1s that represents each character (alphabetic, numeric,  or special). It is a standard way to transmit characters.

asynchronous communication (ASYNC) A type of serial communication by which data is passed between devices. "Asynchronous" means that the timing of each character transmitted is independent of other characters.

average access time The time (in milliseconds) that a disk drive takes to find the right track in response to a request (the seek time), plus the time it takes to get to the right place on the track (the latency).
B
back up To make a copy of a file, group of files, or the entire contents of a hard disk.

baud rate A measure of the actual rate of symbols transmitted per second, which may represent more than one bit. A given baud rate may have more than one bps (bits per second) rate. Baud rate is often used interchangeably with bps, although this is technically incorrect.

binary A numbering system with two digits, 0 and 1, used by computers to store and process information.

BIOS (basic input/output system) A collection of primitive computer routines (stored in ROM in a PC) that control peripherals such as the video display, disk drives, and keyboard.

bisynchronous (BISNYC) Computer communications in which both sides simultaneously transmit and receive data.

bit A binary digit: the smallest piece of information that can be recognized and processed by a computer. A bit is either 0 or 1. Bits can form larger units of information called nibbles (4 bits), bytes (8 bits), and words (usually 16 bits). See also data bit

bits per second (bps) The number of data bits sent per second between two modems. Used as a measure of the rate at which digital information is handled, manipulated, or transmitted. Similar, but not identical, to baud rate.

buffer An area of RAM (usually 512 bytes plus another 16 for overhead) in which DOS stores data temporarily. See also frame buffer

bus A group of wires used to carry a set of related signals or information within a computer from one device to another.

byte A sequence of adjacent binary digits that the computer considers a unit. A byte consists of 8 bits.
C
cache An amount of RAM set aside to hold data that is expected to be accessed again. The second access, which finds the data in RAM, is very fast. (Pronounced like "cash.")

CGA IBM's first color graphics standard, capable of 320 by 320 resolution at four colors (or gray shades on laptops), or 640 by 200 at two colors (black and white). CGA-only laptops are behind the times.

chip An integral part of the PC. These are very tiny, square or rectangular slivers of material (usually silicon) with electrical components built in. Some of the chips in a computer aid in memory, but the most important chip is the microprocessor. This is the "8088", "286", "386", or "486" that is referred to when talking about a specific machine's features.

clone An IBM PC/XT- or AT-compatible computer made by another manufacturer.

cluster A hard-disk term that refers to a group of sectors, the smallest storage unit recognized by DOS. On most modern hard disks, four 512-byte sectors make up a cluster, and one or more clusters make up a track.

CMOS (complementary metal oxide semiconductor) chip A type of memory chip that retains its data when power is turned off as long as it retains a trickle of power from a battery.

coding The act of programming a computer; specifically, generating source code in the language of the program's choice. The most popular languages used by programmers are Pascal, C, and C++.

COM Communications port or serial port used by modems, mice, and some printers. DOS assigns these ports as COM1, COM2, and sometimes COM3 and COM4. DOS also lets you refer to the first communications port as AUX. Note: Some programs count communications ports starting with 0, so "Port 0" or "Communications Port 0" would be COM1, and "Port 1" would be COM2.

communications parameters Settings that define how your communications software will handle incoming data and transmit outgoing data. Parameters include bits per second, parity, data bits, and stop bits.

convergence A video term that describes the way in which the three beams that generate the three color dots (red, green, blue) should meet. When all three dots are excited at the same time and their relative distance is perfect, the result is pure white. Deviation from this harmony (due to an incorrect relationship of the beams to each other) results in poor convergence. This causes white pixels to show bits of color and can decrease image sharpness and resolution.

CPU (central processing unit) The functional "brain" of a computer; the element that does the actual adding and subtracting of 0s and 1s and the manipulation and moving of data that is essential to computing.
D
database A file consisting of a number of records or tables, each of which is constructed of fields (in column format) of a particular type, together with a collection of operations that facilitate searching, sorting, recombination, and similar acts.

data bits The bits sent by a modem. These bits make up characters and don't include the bits that make up the communications parameters. See also bit

device Any piece of computer hardware.

device-level interface An interface that uses an external controller to connect the disk drives to the PC. Among its other functions, the controller converts the serial stream of data read from the drive into parallel data for the host computer's bus. ST506 and ESDI are device-level interfaces.

digital-to-analog converter (DAC) A circuit that accepts digital input signals and converts them to analog output signals. Sometimes called DAC chips, they are used in VGA video cards, for example.

directory A list of file names and locations of files on a disk.

disk A circular metal platter or mylar diskette with magnetic material on both sides that stores programs and data. Disks are rotated continuously so that read/write heads mounted on movable or fixed arms can read or write programs or data to and from the disk. See also floppy disk, hard disk

disk cache A portion of a computer's RAM set aside for temporarily holding information read from a disk. The disk cache does not hold entire files as does a RAM disk, but information that has either been recently requested from a disk or has previously been written to a disk.

disk defragmenter Defragmentation is the rewriting of all the parts of a file on contiguous sectors. When files on a hard disk drive are being updated, the information tends to be written all over the disk, causing delays in file retrieval. Defragmentation reverses this process, and is often achieved with special defragmentation programs that provide up to 75 percent improvement in the speed of disk access and retrieval.

disk drive The motor that actually rotates the disk, plus the read/write heads and associated mechanisms, usually in a mountable housing. Sometimes used synonymously to mean the entire disk subsystem.

disk format Refers to the method in which data is organized and stored on a floppy or hard disk.

diskette See floppy disk

DOS (disk operating system) A set of programs that control the communications between components of the computer. Examples of DOS functions are: displaying characters on the screen, reading and writing to a disk, printing, and accepting commands from the keyboard. DOS is a widely used operating system on IBM-compatible personal computers (PCs).

dot matrix printer A type of printer technology using a print head with pins to poke out arrays of dots that form text and graphics.

dot pitch A color monitor characteristic; specifically, the distance between the holes in the shadow mask. It indirectly describes how far apart the individual dots are on screen. The smaller the dot pitch, the finer the image's "grain." Some color monitors, such as the Sony Trinitron, use a slot mask (also known as an aperture grille) that is perforated by strips, not holes, in the shadow mask. In this case, the dots are arranged in a linear fashion, and their density is called striped dot pitch. (Monochrome monitors do not use a shadow mask and therefore do not have a dot pitch.)

download To receive information from another modem and computer over the telephone lines. It is the opposite of upload.

DRAM (dynamic random-access memory) The most commonly used type of memory, found on video boards as well as on PC system boards. DRAM is usually slower than VRAM (video random-access memory), since it has only a single access pathway.

drive array A storage system composed of several hard disks. Data is divided among the different drives for greater speed and higher reliability.

DSDD (double-sided, double-density) On PCs and laptops, DSDD means 720K 3 1/2-inch diskettes or 360K 5 1/4-inch diskettes.

DSHD (double-sided, high-density) On PCs and laptops, DSHD means 1.44Mb 3 1/2-inch diskettes or 1.2Mb 5 1/4-inch diskettes.
E
EISA (Extended Industry Standard Architecture) Primarily a desktop specification for high-performance computers. Competes with IBM's Micro Channel architecture (MCA). EISA computers can use existing PC, XT, and AT add-in cards; MCA computers can't. See also Micro Channel architecture

E-mail (electronic mail) The exchange of messages via a bulletin board or on-line service. One user leaves the message on the service "addressed" to another user. The other user later connects to the same service and can read the message and reply to it.

expanded memory Memory that can be used by some DOS software to access more than the normal 640K (technically, more than 1Mb). 80386, 80386SX, and 80486 computers can create expanded memory readily by using an EMS (expanded memory specification) driver provided with DOS, through Microsoft Windows, or through a memory manager such as Quarterdeck QEMM or Qualitas 386 To The Max. To use expanded memory, a program must be EMS-aware or run under an environment such as Microsoft Windows. 8088- and 80286-based computers often need special hardware to run expanded memory. See also memory

extended memory Memory above 1Mb in 80286 and higher computers. Can be used for RAM disks, disk caches, or Microsoft Windows, but requires the processor to operate in a special mode (protected mode or virtual real mode). With a special driver, you can use extended memory to create expanded memory. See also memory, RAM, ROM
F
file A collection of related records treated as a unit. In a computer system, a file can exist on magnetic tape, disk, or as an accumulation of information in system memory. A file can contain data, programs, or both.

floppy disk A removable, rotating, flexible magnetic storage disk. Floppy disks come in a variety of sizes, but 3 1/2-inch and 5 1/4-inch are the most popular. Storage capacity is usually between 360K and 1.44MB. Also called flexible disk or diskette. See also disk, hard disk

floppy drive A disk drive designed to read and write data to a floppy disk for transfer to and from a computer.

format A DOS command that records the physical organization of tracks and sectors on a disk.

frame buffer A large section of memory used to store an image to be displayed on-screen as well as parts of the image that lie outside the limits of the display. See also buffer
G
GCR (group coded recording) A hard-disk term for a storage process where bits are packaged as groups, with each group assigned to and stored under a particular code. Used by RLL drives.

graphics coprocessor Similar to a math coprocessor in concept, a programmable chip that can speed video performance by carrying out graphics processing independently of the microprocessor. Graphics coprocessors can speed up performance in two ways: by taking over tasks the main processor would lose time performing and by optimizing for graphics. Video adapter cards with graphics coprocessors are expensive compared to those without them, but they speed up graphics operations considerably. Among the coprocessor's common abilities are drawing graphics primitives and converting vectors to bitmaps.
H
handshaking A modem term that describes the initial exchange between modems. It's like "are you there?" with the response "I am here."

hard disk A mass storage device that transfers data between the computer's memory and the disk storage media. Hard disks are nonremovable, rotating, rigid, magnetic storage disks. There are some types of hard disk with removable rigid media in the form of disk packs. See also disk

hardware The physical components of a computer.

head actuator In a disk drive, the mechanism that moves the read/write head radially across the surface of the platter of the disk drive.

high-speed modem A modem operating at speeds from 9,600 to 19,200 bits per second.

host system In telecommunications, the system that you have called up and to which you are connected, such as a BBS (bulletin board system) or an on-line service such as CompuServe.

Hz (Hertz) A unit of measurement. This used to be called cycles per second.

IDE (integrated drive electronics) A disk drive with its own controller electronics built in to save space and money. Many laptops use IDE drives.
I
instructions See application software

Intel A major manufacturer of integrated circuits used in computers. Intel makes the 8086 family of microprocessors and its derivatives: the 8088, 80286, 80386SX and DX, and 80486SX and DX. These are the chips used in the IBM PC family of computers and all the computers discussed in this book.

integrated circuit (IC) A tiny complex of electronic components and their connections that is produced in or on a slice of material (such as silicon). A single IC can hold many electronic elements. Also called a chip.

interlaced and noninterlaced scanning Two monitor schemes with which to paint an image on the screen. Interlaced scanning takes two passes, painting every other line on the first pass and filling in the rest of the lines on the second pass. Noninterlaced scanning paints all the lines in one pass and then paints an entirely new frame. Noninterlaced scanning is preferable because it reduces screen flicker, but it's more expensive.

interleaving A hard-disk term that describes a method of arranging disk sectors to compensate for relatively slow computers. Spreads sectors apart instead of arranging them consecutively. For example, 3:1 interleaving means your system reads one out of every three tracks on one rotation. The time required for the extra spin lets the read/write head catch up with the disk drive, which might otherwise outrun the head's ability to read the data. Thanks to track buffering and the speed of today's PCs, interleaving is obsolete. Look for a "1:1 interleaving," which indicates a noninterleaved drive.

I/O (input/output) Input is the data flowing into your computer. Output is the data flowing out. I/O can refer to the parallel and serial ports, keyboard, video display, and hard and floppy disks.

interrupt request (IRQ) A request for attention and service made to the CPU. The keyboard and the serial and parallel ports all have interrupts. Setting two peripherals to the same IRQ is a cause of hair pulling among desktop PC users; laptops don't suffer the problem as badly because they have few, if any, add-on products that need interrupts set.

ISA (Industry Standard Architecture) Computers using the same bus structure and add-in cards as the IBM PC, XT, and AT. Also called classic bus. It comes in an 8-bit and 16-bit version. Most references to ISA mean the 16-bit version. Many machines claiming ISA compatibility will have both 8- and 16-bit connectors on the motherboard.
K
kilobyte (KB) 1,024 bytes. Sometimes abbreviated as k (lowercase), K-byte, K, or KB for kilobyte and Kb for kilobit (1,024 bits). When in doubt about whether an abbreviation refers to kilobytes or kilobits, it's probably kilobytes, with these exceptions: the speed of a modem (as in 2.4 kilobits per second) and the transfer rate of a floppy disk (as in 500 kilobits per second).
L
local area network (LAN) A small- to moderate-size network in which communications are usually confined to a relatively small area, such as a single building or campus.

logical drive A drive that has been created by the disk operating system (DOS). This is done either at the preference of the user or because the DOS version does not allow a formatted capacity in excess of 32MB. A user with a 100MB hard disk will want to use more than 32MB, so a program will tell DOS there are a bunch of "logical" drives that add up to 100MB. DOS 5.0 eliminates this need.

log on or log off The process of connecting or disconnecting your computer to another system by modem.
M
MB See megabyte

mega One million, but with computers it typically means 1,048,576 (1,024 times 1,024).

megabyte (MB) 1,048,576 bytes (1,024 times 1,024). Used to describe the total capacity of a hard or floppy disk or the total amount of RAM. Sometimes abbreviated as Mb, M, MB, or meg for megabyte; and Mb, M-bit, or Mbit for megabit. When in doubt, it's probably megabyte, not megabit, with these exceptions: the capacity of a single memory chip (a 1-megabit chip; you need eight chips plus an optional ninth parity-checking chip to get 1 megabyte of memory), the throughput of a network (4 megabits per second), and the transfer speed of a hard disk (5 megabits per second).

megahertz (MHz) One million cycles per second, typically used in reference to a computer's clock rate. Both the clock rate and the processor type (80286, 80386, etc.) determine the power and speed of a computer.

memory A device that stores data in a computer. Internal memories are very fast and are either read/write random-access memory (RAM) or read-only memory (ROM). Bulk storage devices are either fixed disk, floppy disk, tape, or optical memories; these hold large amounts of data, but are slower to access than internal memories. See also expanded memory, extended memory, RAM, ROM

MHz See also megahertz

Micro Channel architecture (MCA) The basis for the IBM Micro Channel bus, used in high-end models of IBM's PS/2 series of personal computers. See also EISA

microprocessor An integrated circuit (IC) that communicates, controls, and executes machine language instructions.

microsecond 1/1,000,000 (one-millionth) of a second.

millisecond (ms) 1/1,000 (one-thousandth) of a second. Hard disks are rated in milliseconds. Modern laptop hard disks have drives of 20 to 40 milliseconds, meaning they can find the average piece of data in 1/25 to 1/50 of a second. Older hard disks were about 100 milliseconds. Higher numbers mean slower performance.

modem A combination of the words modulate and demodulate. A device that allows a computer to communicate with another computer over telephone lines.

multimedia The presentation of information on a computer using sound, graphics, animation, video, and text.
N
nanosecond 1/1,000,000,000 (one-billionth) of a second. Memory chips are rated in nanoseconds, typically 80 to 150 nanoseconds. Higher numbers indicate slower chips.

NetWare A popular series of network operating systems and related products made by Novell.

network A continuing connection between two or more computers that facilitates sharing files and resources.
O
online/offline When connected to another computer via modem and telephone lines, a modem is said to be online. When disconnected, it is offline.

operating system (OS) A set of programs residing in ROM and/or on disk that controls communications between components of the computer and the programs run by the computer. MS-DOS is an operating system.

OS/2 (Operating System/2) An operating system developed by IBM and Microsoft for use with Intel's microprocessors. Unlike its predecessor, DOS, OS/2 is a multitasking operating system. This means many programs can run at the same time.

OS/2 Extended Edition IBM's proprietary version of OS/2; it includes built-in communications and database-management facilities.
P
parallel port A port that transmits or receives 8 bits (1 byte) of data at a time between the computer and external devices. Mainly used by printers. LPT1 is a parallel port, for example.

PCL (printer command language) Usually refers to Hewlett-Packard laser printers. Most H-P compatibles support PCL 4. H-PÆs newest printers (the III series) use PCL 5, which includes scalable fonts and monochrome support for HPGL.

peripheral A device that performs a function and is external to the system board. Peripherals include displays, disk drives, and printers.

pixel A pixel is the smallest information building block of an on-screen image. On a color monitor screen, each pixel is made of one or more triads (red, green, and blue). Resolution is usually expressed in terms of the number of pixels that fit within the width and height of a complete on-screen image. In VGA, the resolution is 640 by 480 pixels; in SuperVGA, it is 800 by 600 pixels.

platter The actual disk inside a hard-disk drive; it carries the magnetic recording material. All but the thinnest disk drives have multiple platters, most of which have two sides that can be used for data storage. (On multiple-platter drives, one side of each platter is usually reserved for storing control information.)

port The channel or interface between the microprocessor and peripheral devices.

program See application software

programming language Any artificial language that can be used to define a sequence of instructions that can ultimately be processed and executed by the computer.

PROM (programmable read-only memory) A (usually) permanent memory chip programmed after manufacture (unlike a ROM chip). EPROMs (erasable PROMs) and EEPROMs (electrically erasable PROMs) can be erased and reprogrammed several times.

protocol Rules governing communications, including flow control (start-stop), error detection or correction, and parameters (data bits, stop bits, parity). If they use the same protocols, products from different vendors can communicate.
R
RAM (random-access memory) Also known as read-write memory; the memory used to execute application programs. See also memory

RAM disk VDISK (virtual disk) that can be used in place of a hard or floppy disk for frequently accessed files. A RAM disk is dangerous for storing data because the contents are lost if the computer crashes or if power is turned off. Most users with extra RAM use it for a disk cache rather than as a RAM disk. See also memory

read/write head The part of the hard disk that writes data to or reads data from a platter. It functions like a coiled wire that reacts to a changing magnetic field by producing a minute current that can be detected and amplified by the electronics of the disk drive.

refresh rate See vertical frequency

RGB (red, green, blue) The triad, the three colors that make up one pixel of a color monitor. See also triad

RLL (run length limited) A hard-disk method of encoding information magnetically that uses a scheme (GCR) to store blocks of data instead of single bits of data. It allows greater storage densities and higher transfer speeds than the other method in use (MFM).

ROM (read-only memory) The memory chip(s) that permanently store computer information and instructions. Your computer's BIOS (basic input/output system) information is stored in a ROM chip. Some laptops even have the operating system (DOS) in ROM.

RS-232C An electrical standard for the interconnection of equipment established by the Electrical Industries Association; the same as the CCITT code V.24. RS-232C is used for serial ports.
S
SCSI (small computer system interface) A system-level interface designed for general purpose applications that allows up to seven devices to be connected to a single host adapter. It uses an 8-bit parallel connection that produces a maximum transfer rate of 5Mb per second. The term is pronounced "scuzzy."

sector The basic storage unit on a hard disk. On most modern hard disks, sectors are 512 bytes each, four sectors make up a cluster, and there are 17 to 34 sectors in a trackùalthough newer drives may have a different number of sectors.

serial port The "male" connector (usually DB-9 or DB-25) on the back of your computer. It sends out data one bit at a time. It is used by modems and, in years past, for daisy-wheel and other printers. The other port on your computer is the parallel port, which is a "female" connector. It is used for printers, backup systems, and mini-networking (LANs). See also COM.

shadow mask Inside the color monitor just behind the screen, it is drilled with small holes, each of which corresponds to a triad. The shadow mask helps guide the electron beams so that each beam hits only one phosphor dot in the triad.

shell A piece of software providing direct communication between the user and the operating system. The main inner part of the system, called the kernel, is enclosed by the shell program, as in a nut.

slot mask Also known as an aperture grille, it serves the same function as the shadow mask on a monitor.

spindle One part of a hard disk, around which the platters rotate.

software Programming tools such as languages, assemblers, and compilers; control programs such as operating systems; or application programs such as electronic spreadsheets and word processors. Software instructs the computer to perform tasks. See also application software

spreadsheet An application commonly used for budgets, forecasting and other finance-related tasks. Data and formulas to calculate those data are entered into ledger-like forms (spreadsheets or worksheets) for analysis, tracking, planning, and evaluation of impacts on economic strategy.

synchronous communication Fixed-rate serial communication, eliminating the need for transmitting inefficient start-stop information. PC-to-mainframe communication may be synchronous; most PC-to-PC communication is asynchronous. Most laptop modems are asynchronous only. If you're not sure whether you need a synchronous-asynchronous modem, you probably don't.

system-level interface A connection between the hard disk and its host system that puts control and data-separation functions on the drive itself (and not on the external controller). SCSI and IDE are system-level interfaces.
T
telecommunication Using your computer to communicate with another computer via telephone lines and your modem.

track The circular path traced across the spinning surface of a disk platter by the read/write head inside the hard-disk drive. The track consists of one or more clusters.

track buffer Memory sometimes built into disk-drive electronics, sufficient to store the contents of one full track. This allows the drive to read the entire track quickly, in one rotation, then slowly send the information to your CPU. It eliminates the need for interleaving and can speed up drive operation.

transfer rate The speed at which a disk drive can transfer information between its platters and your CPU. The transfer rate is typically measured in megabytes per second, megabits per second, or megahertz.

transmission speed See baud rate

triad Three phosphor-filled dots (one red, one green, one blue) arranged in a triangular fashion within a monitor. Each of the three electron guns is dedicated to one of these colors. As the guns scan the screen, each active triad produces a single color, which is determined by the combination of excited color dots and by how active each dot is. See also RGB
U
utility program A program designed to perform maintenance work on a system or on system components, e.g. a storage backup program, a disk and file recovery program, or a resource editor.
V
V. The CCITT international communications standards, pronounced "vee-dot." Various V. standards cover speed (modulation), error correction, data compression, and signaling characteristics.

vertical frequency This is also called the vertical refresh rate, or the vertical scan frequency. It is a monitor term that describes how long it takes to draw an entire screenful of lines, from top to bottom. Monitors are designed for specific vertical and horizontal frequencies. Vertical frequency is a key factor in image flicker. Given a low enough vertical frequency (53 Hz, for example) nearly everyone will see a flicker because the screen isn't rewritten quickly enough. A high vertical frequency (70 Hz on a 14-inch monitor) will eliminate the  flicker for most people.

VGA IBM's third (1987) and current mainstream graphics standard, capable of 640-by-480-pixel resolution at 16 colors or gray shades. SuperVGA (800 by 600) resolution is important on desktop PCs. A handful of laptops support SuperVGA when connected to an external monitor; they use regular VGA when driving the built-in display. Some laptop vendors use "text mode" VGA, which means the monitor displays only 400 pixels, not 480, vertically, and uses double-scan CGA (640 by 400) for graphics.

VRAM (video random-access memory) Special-purpose RAM with two data paths for access, rather than the one path in conventional RAM. The two paths let a VRAM board handle two functions at once: display refresh and processor access. VRAM doesn't force the system to wait for one function to finish before starting the other, so it permits faster operation for the video subsystem.
W
wide area network (WAN) Usually a moderate to large network in which communications are conducted over the telephone lines using modems.

write protection Keeping a file or disk from being written over or deleted. 3 1/2-inch floppy disks use a sliding write-protect tab in the lower-left corner (diagonally across from the beveled corner of the disk) to keep the computer from writing to the disk. When the opening is hidden by the tab (no light passes), you can write to the disk; tab open, you can't write. This can be confusing because it's the exact opposite of how a 5 1/4-inch disk works. Most file management utilities allow you to write-protect individual files.
X
XMA (extended memory specification) Interface that lets DOS programs cooperatively use extended memory in 80286 and higher computers. One such driver is Microsoft's HIMEM.SYS, which manages extended memory and HMA (high memory area), a 64K block just above 1MB.

 

 

Make windows CMD look like Linux.






Make Windows CMD look like Linux


* Open regedit

* Navigate to

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Session Manager\Environment


Back Up:

* Right click on Environment and select Export to back up the Key to a place on your computer


* In the right Window Pane, right click and select

Quote
New \ String Value

and name it PROMPT


* Double click on Prompt and in the Value data: field type the syntax for the Command Prompt you want to use

(for example -
[%USERNAME%@%COMPUTERNAME%$S~]$$)



* Close regedit and either logoff or reboot



After you log out and back in if you see

[%USERNAME%@%COMPUTERNAME%$S~]$$


instead of actually seeing your username
and your computer name then you can just take out the
% and make it your username at your Computer name

 

 

Watch Movies in Ms Paint


                Watch Movies in Ms Paint !
You can REALLY watch movies in paint ?

Here's what you gotta do :

> Open your favorite movie player and play the move (I played the .mpg format in Winamp)

> Hit "PrintScreen", keep playing the movie in the player, dont stop it.

> Open MsPaint.

> Select "Edit>Paste" Or Hit "CTRL+V"

> Presto! You can watch movies in Paint! 

> But there are no Pause, Next, Previous, Stop etc. buttons 

> Spead this fact to all your friends and show how COOL things you can do with Paint!
> Experiment with other formats too, it doesn't play DivX , Flash movies, etc. Microsoft hasn't revealed this i think. MsPaint is GREAT

 

 

MOBILE TRICK-- How to read deleted messages in mobile










A SMS once deleted can’t be read again….but sometimes we hurrily delete some important SMS
Here is the technique that must be followed to retrieve deleted SMS
Required utility:



1) Any system explorer or file explorer program (eg. fileman or fexplorer.provided with the package)
1) Open Fexplorer
2) Select drive C: or D: depending on the memory in which the Sms messages have been saved.
3) For example u selected c: , Then open “system” folder.
4) Then in “system” folder open “mail” folder.
5) Then in this folder u will see different folders (eg 0010001_s) and certain files (eg 00100000). These files are the actual messages. Browse through every folder and open all files till u get the sms u are looking for.
6) For opening the files don’t choose options>file>open as it will show format not supported rather choose options>file>hex/text viewer. By selecting the “Hex/ text viewer” u ll be able to open and read the deleted

 

MAKE UR PDF files TO SPEAK












make ur pdf files to speak
here r the shortcuts for hearing pdf files in abobe reader 6.0 or higher

ctrl+shift+b ---->to hear the whole topic
ctrl+shift+v ---->to hear the page


Trick for Set Time to shutdown windows











You can always set windows to automatically shutdown whenever you want. Like my self, i've always away when downloading movies or series. Here's how to do it..

1.Click Start Button
2.Click Run
3. type at 20:00 shutdown -s 
4.Hit Ok 
5.DONE! 

 here's some explanation. look no 3, here i set windows to shutdown at 8PM(2000).
if you would like to auto shutdown at 3AM just change the value to 03:00. So,there will be like this

at 03:00 shutdown -s

p/s: If you want to restart just change -s to -r . Hope you like it!



How To Manually Remove a Virus from Your Computer











if you are tired of sitting and waiting for your anti-virus software to remove the new virus infection, the steps below are for you. No programming skills are required! Just a basic knowledge of command prompt syntax will do...for this demo, the virus is on the portable USB drive (e:\virus) named virus.vbs





1. Create a back-up. Safety comes above all else. Save your files on removable storage or on another partition aside from the Windows drive.



2. Run the Windows command prompt. You can run the Windows command prompt by either clicking on the Start Menu\All programs\Accessories\Command Prompt or by pressing Windows + R on the keyboard and typing "CMD."



3. Look for the directory or folder where the virus resides. Go to the folder where the virus is hiding. Its usually resides on the Windows temporary folder or on the Windows system folder. Check partitions and drives for viruses, e.g. type "cd e:\virus"



4. Show the hidden virus and remove its attributes. It will be easier if you can see the virus. Remove the virus attributes, which are read only, archive, system file, and hidden file. e.g. type "attrib -r -a -s -h virus.vbs"



5. Delete the virus. Say goodbye to the virus by deleting it, e.g. type "del virus.vbs"


Some site u Never Visited Before.................











Type the following words in google search and click on I`m feeling lucky and Enjoy!! 

google hack
google bearshare
google loco
google gothic
google linus
google l33t
answer to life the universe and everything
google ewmew
xx=klingon
xx=piglatin
xx-elmer
xx-hacker
google bsd
google easter egg
google mozilla
google gizoogle
google bsd
google cheese
ewmew fudd
google suggest
early google
elgoog
google moms
google blog search
google heart page
google mentalplex
google zeitgeist
google holiday
google circa
google bork
google scholar
google windows
google mac
elgoog
blackle


Rename Folder with icon and withouth name











Rename Folder with icon & withouth name

1) Press Alt+1 1time & just put off Alt= ☺
2) Press Alt+1 2time & just put off Alt= ♂
3) Press Alt+1 6time & just put off Alt= •
4) Press Alt+1 8time & just put off Alt= ╟

1) Press Alt+2 1time & just put off Alt= ☻
2) Press Alt+2 2time & just put off Alt= ▬
3) Press Alt+2 3time & just put off Alt= ▐
4) Press Alt+2 4time & just put off Alt= «
5) Press Alt+2 5time & just put off Alt= ╬
6) Press Alt+2 6time & just put off Alt= ♫
7) Press Alt+2 7time & just put off Alt= Ä

1) Press Alt+3 1time & just put off Alt= ♥
2) Press Alt+3 2time & just put off Alt= !
3) Press Alt+3 4time & just put off Alt= ♣
4) Press Alt+3 6time & just put off Alt= §
5) Press Alt+3 7time & just put off Alt= ╒

1) Press Alt+4 1time & just put off Alt= ♦
2) Press Alt+4 3time & just put off Alt= ╝
3) Press Alt+4 5time & just put off Alt= £

1) Press Alt+5 1time & just put off Alt= ♣
2) Press Alt+5 2time & just put off Alt= │
3) Press Alt+5 8time & just put off Alt= π

1) Press Alt+6 1time & just put off Alt= ♠
2) Press Alt+6 3time & just put off Alt= Ü
3) Press Alt+6 4time & just put off Alt= ◙
4) Press Alt+6 7time & just put off Alt= ¬

1) Press Alt+7 1time & just put off Alt= •
2) Press Alt+7 3time & just put off Alt= ○
3) Press Alt+7 5time & just put off Alt= ╤
4) Press Alt+7 7time & just put off Alt= ±

1) Press Alt+8 1time & just put off Alt= ◘
2) Press Alt+8 4time & just put off Alt= ╕

1) Press Alt+9 4time & just put off Alt= ☼
2) Press Alt+9 5time & just put off Alt= Æ’
3) Press Alt+9 7time & just put off Alt= ⌂
4) Press Alt+9 8time & just put off Alt= spece (without name folder)



Deleting autorun.inf











Guyzzzzzz............... fed up with autorun.inf..... is it been a uncalled relative in ur drive...... I have a solution hope so some of u know but its for them whome it may help................
yup ...... 1.Insert the drive 2.Press cntrl+shift+esc(task manager) 3.click the process sub tab 4.Find the explorer.exe 5.Right click on it end process tree
6.Then in task manager click File under that click New task(Run..) there type cmd press enter
7.In command type the Drive Letter(ex: C,D,E,F,G) press enter
8.then type Del autorun.inf press enter
9.md autorun.inf press enter
10.Then again in task manager click File under that click New task(Run..) there type explorer.exe press enter
thats it guyssssssssss really worksss.................. I used md autorun.inf b'coz giving lyk dat same filename doesn't exists in the same drive



How Computer Viruses Work











How Computer Viruses Work

A virus can spell doom for your computer.

Strange as it may sound, the computer virus is something of an Information Age marvel. On one hand, viruses show us how vulnerable we are -- a properly engineered virus can have a devastating effect, disrupting productivity and doing billions of dollars in damages. On the other hand, they show us how sophisticated and interconnected human beings have become.
For example, experts estimate that the Mydoom worm infected approximately a quarter-million computers in a single day in January 2004. Back in March 1999, the Melissa virus was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be  contained. The ILOVEYOU virus in 2000 had a similarly devastating effect. In January 2007, a worm called Storm appeared -- by October, experts believed up to 50 million computers were infected. That's pretty impressive when you consider that many viruses are incredibly simple.
When you listen to the news, you hear about many different forms of electronic infection. The most common are:
Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.
E-mail viruses - An e-mail virus travels as an attachment to e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't  even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software 
Trojanhorses
 - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.
Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.
In this article, we will discuss viruses -- both "traditional" viruses and e-mail viruses -- so that you can learn how they work and understand how to protect yourself.


Virus Origins
Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person.
Unlike a cell, a virus has no way to reproduce by itself. Instead, a biological virus must inject its DNA into a cell. The viral DNA then uses the cell's existing machinery to reproduce itself. In some cases, the cell fills with new viral particles until it bursts, releasing the virus. In other cases, the new virus particles bud off the cell one at a time, and the cell remains alive.
A computer virus shares some of these traits. A computer virus must piggyback on top of some other program or document in order to launch. Once it is running, it can infect other programs or documents. Obviously, the analogy between computer and biological viruses stretches things a bit, but there are enough similarities that the name sticks.
People write computer viruses. A person has to write the code, test it to make sure it spreads properly and then release it. A person also designs the virus's attack phase, whether it's a silly message or the destruction of a hard disk. Why do they do it?
There are at least three reasons. The first is the same psychology that drives vandals and arsonists. Why would someone want to break a window on someone's car, paint signs on buildings or burn down a beautiful forest? For some people, that seems to be a thrill. If that sort of person knows computer programming, then he or she may funnel energy into the creation of destructive viruses.
The second reason has to do with the thrill of watching things blow up. Some people have a fascination with things like explosions and car wrecks. When you were growing up, there might have been a kid in your neighborhood who learned how to make gunpowder. And that kid probably built bigger and bigger bombs until he either got bored or did some serious damage to himself. Creating a virus is a little like that -- it creates a bomb inside a computer, and the more computers that get infected the more "fun" the explosion.
The third reason involves bragging rights, or the thrill of doing it. Sort of like Mount Everest -- the mountain is there, so someone is compelled to climb it. If you are a certain type of programmer who sees a security hole that could be exploited, you might simply be compelled to exploit the hole yourself before someone else beats you to it.
Of course, most virus creators seem to miss the point that they cause real damage to real people with their creations. Destroying everything on a person's hard disk is real damage. Forcing a large company to waste thousands of hours cleaning up after a virus is real damage. Even a silly message is real damage because someone has to waste time getting rid of it. For this reason, the legal system is getting much harsher in punishing the people who create viruses.
Virus History
Traditional computer viruses were first widely seen in the late 1980s, and they came about because of several factors. The first factor was the spread of personal computers (PCs). Prior to the 1980s, home computers were nearly non-existent or they were toys. Real computers were rare, and they were locked away for use by "experts." During the 1980s, real computers started to spread to businesses and homes because of the popularity of the IBM PC (released in 1982) and the Apple Macintosh (released in 1984). By the late 1980s, PCs were widespread in businesses, homes and college campuses.
The second factor was the use of computer bulletin boards. People could dial up a bulletin board with a modem and download programs of all types. Games were extremely popular, and so were simple word processors, spreadsheets and other productivity software. Bulletin boards led to the precursor of the virus known as the Trojan horse. A Trojan horse is a program with a cool-sounding name and description. So you download it. When you run the program, however, it does something uncool like erasing your disk. You think you are getting a neat game, but it wipes out your system. Trojan horses only hit a small number of people because they are quickly discovered, the infected programs are removed and word of the danger spreads among users.
The third factor that led to the creation of viruses was the floppy disk. In the 1980s, programs were small, and you could fit the entire operating system, a few programs and some documents onto a floppy disk or two. Many computers did not have hard disks, so when you turned on your machine it would load the operating system and everything else from the floppy disk. Virus authors took advantage of this to create the first self-replicating programs.

Early viruses were pieces of code attached to a common program like a popular game or a popular word processor. A person might download an infected game from a bulletin board and run it. A virus like this is a small piece of code embedded in a larger, legitimate program. When the user runs the legitimate program, the virus loads itself into memory and looks around to see if it can find any other programs on the disk. If it can find one, it modifies the program to add the virus's code into the program. Then the virus launches the "real program." The user really has no way to know that the virus ever ran. Unfortunately, the virus has now reproduced itself, so two programs are infected. The next time the user launches either of those programs, they infect other programs, and the cycle continues.
If one of the infected programs is given to another person on a floppy disk, or if it is uploaded to a bulletin board, then other programs get infected. This is how the virus spreads.
The spreading part is the infection phase of the virus. Viruses wouldn't be so violently despised if all they did was replicate themselves. Most viruses also have a destructive attack phase where they do damage. Some sort of trigger will activate the attack phase, and the virus will then do something -- anything from printing a silly message on the screen to erasing all of your data. The trigger might be a specific date, the number of times the virus has been replicated or something similar.
In the next section, we will look at how viruses have evolved over the years.


Google fun











We all know that google is most popular search engine and all of us use google daily, but do you know that you can do lot of fun from google.
If you get bored of that google search engine page then now you can set diffrent styles of search pages as your homepage of browser.
1). Easter eggs


Open google.com -> write google easter eggs -> click on m feeling lucky.
you can set above as your homepage. Its really cute you can control bummy with mouse and try to catch spell of google.

2). Google bearshare


Open google.com -> write google bearshare -> click on m feeling lucky.

3). Google bsd


Open google.com -> write google bsd -> click on m feeling lucky.

4). Google linux(penguin


Open google.com -> write google linux -> click on m feeling lucky.

5). Elgoog (mirror image of google)


Open google.com -> write elgoog -> click on m feeling lucky.
enjoy…




99 ways to make your computer blazingly fast











1. Defragment your computer hard disk using free tools like SmartDefrag.

2. You should also defragment your Windows pagefile and registry.

3. Clean up hard drive disk space being taken up by temporary files, the recycle bin, hibernation and more. You can also use a tool like TreeSize to determine what is taking up space on your hard drive.

4. Load up Windows faster by using Startup Delayer, a free program that will speed up the boot time of Windows by delaying the startup of programs.

5. Speaking of startup programs, many of them are useless and can be turned off. Use the MSCONFIG utility to disable startup programs.

6. By default, the size of the paging file is controlled by Windows, which can cause defragmentation. Also, the paging file should be on a different hard drive or partition than the boot partition. Read here on the rules for best paging file performance.

7. In Windows XP and Vista, the Windows Search indexing service is turned on for all local hard drives. Turning off indexing is a simple way to increase performance.

8. If you don’t care about all the fancy visual effects in Windows, you can turn them off by going to Performance Options.

9. You can optimize the Windows boot time using a free program called Bootvis from Microsoft.

10. Clean your registry by removing broken shortcuts, missing shared DLLs, invalid paths, invalid installer references and more. Read about the 10 best and free registry cleaners.

11. One of the main reasons why PC’s are slow is because of spyware. There are many programs to remove spyware including Ad-Aware, Giant Antispyware, SUPERAntiSpyware, and more.

12. If you have a deeper spyware infection that is very hard to remove, you can use HijackThis to remove spyware.

13. Remove unwanted pre-installed software (aka junk software) from your new PC using PC Decrapifier.

14. Disable unnecessary Windows services, settings, and programs that slow down your computer.

15. Tweak Windows XP and tweak Windows Vista settings using free programs

16. Disable UAC (User Account Control) in Windows Vista

17. Tweak your mouse settings so that you can copy and paste faster, scroll faster, navigate quickly while browsing and more. Read here to learn how to tweak your mouse.

18. Delete temporary and unused files on your computer using a free program like CCleaner. It can also fix issues with your registry.

19. Delete your Internet browsing history, temporary Internet files, cookies to free up disk space.

20. Clean out the Windows prefetch folder to improve performance.

21. Disable the XP boot logo to speed up Windows boot time.

22. Reduce the number of fonts that your computer has to load up on startup.

23. Force Windows to unload DLLs from memory to free up RAM.

24. Run DOS programs in separate memory spaces for better performance.

25. Turn off system restore only if you regularly backup your Windows machine using third party software.

26. Move or change the location of your My Documents folder so that it is on a separate partition or hard drive.

27. Turn off default disk performance monitors on Windows XP to increase performance.

28. Speed up boot time by disabling unused ports on your Windows machine.

29. Use Process Lasso to speed up your computer by allowing it to make sure that no one process can completely overtake the CPU.

30. Make icons appear faster while browsing in My Computer by disabling search for network files and printers.

31. Speed up browsing of pictures and videos in Windows Vista by disabling the Vista thumbnails cache.

32. Edit the right-click context menu in Windows XP and Vista and remove unnecessary items to increase display speed.

33. Use the Windows Performance Toolkit and the trace logs to speed up Windows boot time.

34. Speed up your Internet browsing by using an external DNS server such as OpenDNS.

35. Improve Vista performance by using ReadyBoost, a new feature whereby Vista can use the free space on your USB drive as a caching mechanism.

36. If you have a slow Internet connection, you can browse web pages faster using a service called Finch, which converts it into simple text.

37. Use Vista Services Optimizer to disable unnecessary services in Vista safely.

38. Also, check out my list of web accelerators, which are programs that try to prefetch and cache the sites you are going to visit.

39. Speed up Mozilla Firefox by tweaking the configuration settings and by installing an add-on called FasterFox.

40. Learn how to build your own computer with the fastest parts and best hardware.

41. Use a program called TeraCopy to speed up file copying in Windows XP and Vista.

42. Disable automatic Last Access Timestamp to speed up Windows XP.

43. Speed up the Start Menu in Vista by hacking the MenuShowDelay key in the registry.

44. Increase the FileSystem memory cache in Vista to utilize a system with a large amount of RAM.

45. Install more RAM if you are running XP with less than 512 MB or Vista with less than 1 GB of RAM.

46. Shut down XP faster by reducing the wait time to kill hung applications.

47. Make sure that you have selected “Adjust for best performance” on the Performance tab in System Properties.

48. If you are reinstalling Windows, make sure that you partition your hard drives correctly to maximize performance.

49. Use Altiris software virtualization to install all of your programs into a virtual layer that does not affect the registry or system files.

50. Create and install virtual machines for free and install junk program, games, etc into the virtual machines instead of the host operating system. Check out Sun openxVM.

51. Do not clear your paging file during shutdown unless it is needed for security purposes. Clearing the paging file slows down shutdown.

52. If your XP or Vista computer is not using NFTS, make sure you convert your FAT disk to the NTFS file system.

53. Update all of your drivers in Windows, including chipset and motherboard drivers to their latest versions.

54. Every once in a while run the built-in Windows Disk Cleanup utility.

55. Enable DMA mode in Windows XP for IDE ATA/ATAPI Controllers in Device Manager.

56. Remove unnecessary or old programs from the Add/Remove dialog of the Control Panel.

57. Use a program click memtest86 or Prime95 to check for bad memory on your PC.

58. Determine your BIOS version and check the manufactures website to see if you need to update your BIOS.

59. Every once in a while, clean your mouse, keyboard and computer fans of dust and other buildup.

60. Replace a slow hard drive with a faster 7200 RPM drive, SATA drive, or SAS drive.

61. Changing from Master/Slave to Cable Select on your hard drive configuration can significantly decrease your boot time.

62. Perform a virus scan on your computer regularly. If you don’t want to install virus protection, use some of the free online virus scanners.

63. Remove extra toolbars from your Windows taskbar and from your Internet browser.

64. Disable the Windows Vista Sidebar if you’re not really using it for anything important. All those gadgets take up memory and processing power.

65. If you have a SATA drive and you’re running Windows Vista, you can speed up your PC by enabling the advanced write caching features.

66. Learn how to use keyboard shortcuts for Windows, Microsoft Word, Outlook, or create your own keyboard shortcuts.

67. Turn off the Aero visual effects in Windows Vista to increase computer performance.

68. If you are technically savvy and don’t mind taking a few risks, you can try to overclock your processor.

69. Speed up the Send To menu in Explorer by typing “sendto” in the Run dialog box and deleting unnecessary items.

70. Make sure to download all the latest Windows Updates, Service Packs, and hot fixes as they “normally” help your computer work better.

71. Make sure that there are no bad sectors or other errors on your hard drive by using the ScanDisk orchkdsk utility.

72. If you are not using some of the hardware on your computer, i.e. floppy drive, CD-ROM drive, USB ports, IR ports, Firewire, etc, then go into your BIOS and disable them so that they do not use any power and do not have to be loaded during boot up.

73. If you have never used the Recent Documents feature in Windows, then disable it completely as a long list can affect PC performance.

74. One basic tweak that can help in performance is to disable error reporting in Windows XP

75. If you don’t care about a pretty interface, you should use the Windows Classic theme under Display Properties.

76. Disable short filenames if you are using NTFS by running the following command: fsutil behavior set disable8dot3 1. It will speed up the file creation process.

77. If you have lots of files in a single folder, it can slow down Explorer. It’s best to create multiple folders and spread out the files between the folders.

78. If you have files that are generally large, you might want to consider increasing the cluster size on NTFS to 16K or even 32K instead of 4K. This will help speed up opening of files.

79. If you have more than one disk in your PC, you can increase performance by moving your paging file to the second drive and formatting the volume using FAT32 instead of NTFS.

80. Turn off unnecessary features in Vista by going to Control Panel, choosing Uninstall a program, and then clicking on Turn Windows features on and off. You can turn off Remote Differential Compression, Tablet PC components, DFS replication service, Windows Fax & Scan, Windows Meeting Space, and lots more.

81. Install a free or commercial anti-virus program to help protect against viruses, etc. Make sure to use an anti-virus program that does not hog up all of your computer resources.

82. Completely uninstall programs and applications using a program like Revo Uninstaller. It will get rid of remnants left behind by normal uninstalls.

83. If you know what you are doing, you can install several hard drives into your machine and set them up in RAID 0, RAID 5, or other RAID configurations.

84. If you are using USB 1.0 ports, upgrade to 2.0. If you have a Firewire port, try to use that instead of a USB port since Firewire is faster than USB right now.

85. Remove the drivers for all old devices that may be hidden in Device Manager that you no longer use.

86. A more extreme option is to choose a faster operating system. If you find Vista to be slow, go with Windows XP. Switching to Mac or Linux is also an option.

87. One of the easiest ways to speed up your PC is to simply reformat it. Of course, you want to backup your data, but it is the best way to get your computer back to peak performance.

88. Speed up Internet browsing in IE by increasing the number of max connections per server in the registry.

89. If you use uTorrent to download torrents, you can increase the download speeds by tweaking the settings.

90. If you have a desktop background, make sure it’s a small and simple bitmap image rather than a fancy picture off the Internet. The best is to find a really small texture and to tile it.

91. For the Virtual Memory setting in Windows (right-click on My Computer, Properties, Advanced, Performance Settings, Advanced, Virtual Memory), make sure the MIN and MAX are both the same number.

92. If you search on Google a lot or Wikipedia, you can do it much faster on Vista by adding them to the Vista Start Menu Instant Search box.

93. If you have a custom built computer or a PC that was previously used, make sure to check the BIOS for optimal settings such as enabled CPU caches, correctly set IDE/SATA data transfer modes, memory timings, etc. You can also enable Fast/Quick boot if you have that option.

94. If you have a SCSI drive, make sure the write cache is enabled. You can do so by opening the properties of the SCSI drive in Windows.

95. If you have a machine with an older network card, make sure to enable the onboard processor for the network card, which will offload tasks from the CPU.

96. If you are using Windows Vista, you can disable the Welcome Center splash screen that always pops up.

97. If you already have anti-spyware software installed, turn off Windows Defender protection.

98. If you are running a 32-bit version of Windows and have 4GB of RAM or more, you can force Windows to see and use all of the RAM by enabling PAE.

99. Buy a new computer



10 reasons why PCs crash U must Know

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1 Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is http://www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on  the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4 Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go  to

* Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5 Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6 Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates h**p://www.nai.com&#41 Another is Norton AntiVirus 2000, made by Symantec h**p://www.symantec.com).

7 Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8 Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It  works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from

Code:
http://www.jv16.org
Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

9 Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from

Code:
http://www.computernerd.comor
or

Code:
http://www.coolit.com
CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10 Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

Free calls to any landline or mobile in the world











 Check on this cool site and make free calls all over the world...

Daily only 5minutes per call....

This surely works..

But remember head phones are necessary for ur voice to make audible for them....

Code:
http://evaphone.com/



How SMS Works











Just when we're finally used to seeing everybody constantly talking on their cell phones, it suddenly seems like no one is talking at all. Instead, they're typing away on tiny numerical pads, using their cell phones to send quick messages. SMS, or text messaging, has replaced talking on the phone for a new "thumb generation" of texters. In this article, we'll find out how text messaging works, explore its uses and learn why it sometimes takes a while for your text message to get to its recipient.
SMS Attacks
Recently it has been suggested that SMS messages could be used to attack a cell phone system. The basic idea is very simple. If a large number of SMS messages were sent by computers to phones in a small geographical area (like a city), these messages would overwhelm the control channels and make it impossible for the cell phone system to set up calls. Now that cell phone providers know about the possibility of this threat, they can design systems to throttle messages coming from the SMSC onto the network.
What is SMS?
SMS stands for short message service. Simply put, it is a method of communication that sends text between cell phones, or from a PC or handheld to a cell phone. The "short" part refers to the maximum size of the text messages: 160 characters (letters, numbers or symbols in the Latin alphabet). For other alphabets, such as Chinese, the maximum SMS size is 70 characters. But how do SMS messages actually get to your phone? If you have read How Cell Phones Work, you can actually see what is happening.
Even if you are not talking on your cell phone, your phone is constantly sending and receiving information. It is talking to its cell phone tower over a pathway called a control channel. The reason for this chatter is so that the cell phone system knows which cell your phone is in, and so that your phone can change cells as you move around. Every so often, your phone and the tower will exchange a packet of data that lets both of them know that everything is OK.
Your phone also uses the control channel for call setup. When someone tries to call you, the tower sends your phone a message over the control channel that tells your phone to play its ring tone. The tower also gives your phone a pair of voice channel frequencies to use for the call.
The control channel also provides the pathway for SMS messages. When a friend sends you an SMS message, the message flows through the SMSC, then to the tower, and the tower sends the message to your phone as a little packet of data on the control channel. In the same way, when you send a message, your phone sends it to the tower on the control channel and it goes from the tower to the SMSC and from there to its destination. The actual data format for the message includes things like the length of the message, a time stamp, the destination phone number, the format, etc. For a complete byte-by-byte breakdown of the message format, see this page. In the next section we'll learn about some of the uses and advantages of SMS.
Why 160 Characters?
SMS was designed to deliver short bursts of data such as numerical pages. To avoid overloading the system with more than the standard forward-and-response operation, the inventors of SMS agreed on a 160-character maximum message size. But the 160-character limit is not absolute. Length limitations may vary depending on the network, phone model and wireless carrier. Some phones don't allow you to keep typing once the 160-character limit is reached. You must send your message before continuing. However, some services will automatically break any message you send into chunks of 160 characters or less. So, you can type and send a long message, but it will be delivered as several messages.
Why use SMS?
SMS has several advantages. It is more discreet than a phone conversation, making it the ideal form for communicating when you don't want to be overheard. It is often less time-consuming to send a text message than to make a phone call or send an e-mail. SMS doesn't require you to be at your computer like e-mail and instant messaging (IM) do -- although some phones are equipped for mobile e-mail and IM services. SMS is also a convenient way for deaf and hearing-impaired people to communicate.
SMS is a store-and-forward service, meaning that when you send a text message to a friend, the message does not go directly to your friend's cell phone. The advantage of this method is that your friend's cell phone doesn't have to be active or in range for you to send a message. The message is stored in the SMSC (for days if necessary) until your friend turns his cell phone on or moves into range, at which point the message is delivered. The message will remain stored on your friend's SIM card until he deletes it. In addition to person-to-person messages, SMS can be used to send a message to a large number of people at a time, either from a list of contacts or to all the users within a particular area. This service is called broadcasting and is used by companies to contact groups of employees or by online services to distribute news and other information to subscribers.
In a 2004 University of Plymouth study on the psychology of SMS users, researchers found that mobile phone users were primarily either "texters" or "talkers" [ ref]. Compared to the talkers, the texters sent nearly double the number of SMS messages and made less than half as many voice calls per month. The texters preferred SMS to voice calls for its convenience as well as for the ability to review a message before sending it.
Companies have come up with many uses for the service beyond just your typical person-to-person message. Because SMS doesn't overload the network as much as phone calls, it is frequently used by TV shows to let viewers vote on a poll topic or for a contestant. As a promotional tool, wireless carriers put up giant screens at concerts and other large-scale events to display text messages from people in the audience.
You can use text messaging subscription services to get medication reminders sent to your phone, along with weather alerts, news headlines or even novels broken into 160-character "chapters." Internet search engines such as Yahoo! and Google have short messaging services that enable users to get information such as driving directions, movie showtimes or local business listings just by texting a query to the search engine's phone number. Social networking services such as Dodgeball use SMS to alert people who live in big cities when their friends or crushes are nearby. The possibilities for integrating SMS into your lifestyle seem endless.
Naturally, SMS has limitations, and there are some people who feel it has outlived its usefulness. In the next section, we'll look at the disadvantages of SMS and some of the alternatives out there.
SMS History
SMS was created during the late 1980s to work with a digital technology called GSM (global system for mobile communications), which is the basis for most modern cell phones. The Norwegian engineers who invented it wanted a very simple messaging system that worked when users' mobile phones were turned off or out of signal range. Most sources agree that the first SMS message was sent in the UK in 1992. As SMS was born in Europe, it's not surprising that it took a little longer to make its way to the United States. Even today, texting enjoys much greater popularity in Europe, though its stateside use is on the rise. A July 2005 study found that 37 percent of U.S. mobile phone owners had sent or received at least one text message in the previous month



Mobile Tricks and codes











Call Diverting
All
To Activate: * * 21 * NUMBER # [SEND]
To Cancel: # # 21 # [SEND]
To Check: * # 21 # [SEND]
No Answer
To Activate: * * 61 * NUMBER # [SEND]
To Cancel: # # 61 # [SEND]
To Check: * # 61 # [SEND]
Unreachable
To Activate: * * 62 * NUMBER # [SEND]
To Cancel: # # 62 # [SEND]
To Check: * # 62 # [SEND]
Busy
To Activate: * * 67 * NUMBER # [SEND]
To Cancel: # # 67 # [SEND]
To Check: * # 67 # [SEND]
To Cancel All Call Forwarding # # 002 # [SEND]
Diverting Data Calls
All
To Activate: * * 21 * NUMBER * 25 # [SEND]
To Cancel: # # 21 # * 25 [SEND]
To Check Status: * # 21 # * 25 # [SEND]
No Answer
To Activate: * * 61 * NUMBER * 25 # [SEND]
To Cancel: # # 61 * 25 # [SEND]
To Check Status: * # 61 # * 25 # [SEND]
Unreachable
To Activate: * * 62 * NUMBER * 25 # [SEND]
To Cancel: # # 62 # * 25 # [SEND]
To Check Status: * # 62 # * 25 # [SEND]
Busy
To Activate: * * 67 * NUMBER * 25 # [SEND]
To Cancel: # # 67 # * 25 # [SEND]
To Check Status: * # 67 # * 24 # [SEND]
Diverting Fax Calls
All
To Activate: * * 21 * NUMBER * 13 #[SEND]
To Cancel: # # 21 # * 13 # [SEND]
To Check Status: * # 21 # * 13 # [SEND]
No Answer
To Activate: * * 61 * NUMBER * 13 # [SEND]
To Cancel: # # 61 * 13 # [SEND]
To Check Status: * # 61 # * 13 # [SEND]
Unreachable
To Activate: * * 62 * NUMBER * 13 # [SEND]
To Cancel: # # 62 # * 13 # [SEND]
To Check Status: * # 62 # * 13 # [SEND]
Busy
To Activate: * * 67 * NUMBER * 13 # [SEND]
To Cancel: # # 67 # * 13 # [SEND]
To Check Status: * # 67 # * 13 #[SEND]
Call Barring
Before you can activate these barring services you will need a barring code from your service provider. Call Barring can not be activated if Call Forwarding diverts are already in use.
All Calls
To Activate: * 330 * BARRING CODE # [SEND]
To Cancel: # 330 * BARRING CODE # [SEND]
To Check: * # 330 # [SEND]
All Outgoing Calls
To Activate: * 333 * BARRING CODE # [SEND]
To Cancel: # 333 * BARRING CODE # [SEND]
To Check: * # 333 # [SEND]
All Incoming Calls
To Activate: * 353 * BARRING CODE # [SEND]
To Cancel: # 353 * BARRING CODE # [SEND]
To Check: * # 353 # [SEND]
All Outgoing Calls
To Activate: * 33 * BARRING CODE# [SEND]
To Cancel: # 33 * BARRING CODE # [SEND]
To Check: * # 33 # [SEND]
All Outgoing International Calls
To Activate: * 331 * BARRING CODE# [SEND]
To Cancel: # 331 * BARRING CODE # [SEND]
To Check: * # 331 # [SEND]
All Outgoing International Calls Except To Home Country
To Activate: * 332 * BARRING CODE# [SEND]
To Cancel: # 332 * BARRING CODE # [SEND]
To Check: * # 332 # [SEND]
All Incoming Calls
To Activate: * 35 * BARRING CODE # [SEND]
To Cancel: # 35 * BARRING CODE # [SEND]
To Check: * # 35 # [SEND]
All Incoming Calls When Outside Home Country
To Activate: * 351 * BARRING CODE # [SEND]
To Cancel: # 351 * BARRING CODE # [SEND]
To Check: * # 351 # [SEND]
Canceling All Call Barring # 330 * BARRING CODE # [SEND]
Call Waiting
To Activate: * 43 # [SEND]
To Deactivate: # 43 # [SEND]
To Check: * # 43 # [SEND]
Calling Line Identity
Outgoing
To Activate: * 31 # [SEND]
To Deactivate: # 31 # [SEND]
To Check: * # 31 # [SEND]
Incoming
To Activate: * 30 # [SEND]
To Deactivate: # 30 # [SEND]
Tips'n'Tricks of Nokia
I accept no responsibility of any kind for damage done to your phone whilst trying these tricks. I have included this information for educational purposes only.
Below are various TIPSnTRICKS based on the Nokia mobile phones. Different ones will work for different models, but most of them will work for all models.
To check the IMEI (International Mobile Equipment Identity) Type-
*#06#
Information you get from the IMEI-
XXXXXX XX XXXXXX X
TAC FAC SNR SP
TAC = Type approval code
FAC = Final assembly code
SNR = Serial number
SP = Spare
To check the phones Software revision type-
*#0000#
Information you get from the Software revision-
V 05.31
18-02-99
NSE-3
1ST Line = Software revision
2ND Line = The date of the software release
3RD Line = Phone type
To enter the service menu type-
*#92702689# (*#WAR0ANTY#)
Serial number (IMEI)
Production date (MM/YY)
Purchase date (MM/YY) You can only enter the date once.
Date of last repair (0000=No repair)
Transfer user data to another Nokia phone via Infra-Red
Clock Stopping
To check weather your SIM Card supports clock stopping type-
Please not this is not for free calls. This feature is to check weather your sim card supports "Clock Stopping". If your sim does support it, your phone will consume less battery power than if it didn't support it.
*#746025625# (*#SIM0CLOCK#)
Revealing the Headphone and Car-Kit menus
Please note that if you do these next tricks, the new menus can't be erased without restoring the factory default settings. To do these tricks you need to short-circuit the pins on the bottom of the phone next to where you plug in you charger.
1. To activate the "Headset" menu, you need to short-circuit pins "3" and "4". After a short time the word "Headset" will be shown in the display. Menu 3-6 is now enabled.
2. To activate the "Car" menu, you need to short-circuit pins "4" and "5". After a short time the word "Car" will be shown in the display. Menu 3-7 is now enabled.
THE REBOOT TRICK
This should work on all software versions of the 6110.
1. Go to the Calendar (Menu-8)
2. Make a note or reminder.
3. Enter some text into the edit box.
4. Hold "Clear" until the whole text is cleared, then press "Back".
5. Press "0". The main screen will now be showing but a space appears on the screen. (you can't see it)
6. Enter 4 digits (e.g. 1234).
7. Use the down arrow to move the cursor to the left side of the numbers and the space (Down arrow twice).
8. Now enter 6 digits and press the call button.
Wait for a few seconds, the screen should start to flash and reboots. It should alsowork on other menus like the "Profiles" menu.
EFR CALL QUALITY
To activate EFR (Enhanced Full Rate) Enter the code-
*3370#
This improves call quality but decreases batterylife by about 5%
To deactivate it, Enter the code-
#3370#
THE JAMES BOND TRICK
If you short-circuit theleft middle and right pins on the bottom of the phone with all connections touching each other, the Nokia software hangs! The profile "Headset" will be activated. Before you do this just activate the "Automatic Answer" in the headset profile and set the ringing volume to "Mute". Now you can use your phone for checking out what people are talking about in a room. Just place it under a table in a room and call it. The phone receives the call without ringing and you can listen to what people are saying.
NETWORK MONITOR
There is a hidden menu inside your Nokia phone. If you want to activate it, you'll have to re-program some chips inside of your phone.
Check your software version. You can only continue if you have v4.33, v4.73 or v5.24.
Take apart the phone.
De-solder the EEPROM (ATMEL AT 24C64).
Read out the data with an EEPROM programmer and save it to a file (Backup).
If you have v.33 or v4.73, change the address "03B8" from "00" to "FF".
If you have v5.24 then change the address "0378" from "00" to "FF".
Write the new data to the EEPROM and solder it back to the phone,
Power on your phone and you should have "Netmonitor" enabled.
The Network Monitor gives you the following information.
Carrier number
MS RX Level in DBM
Received signal quality
MS TX power level
C1 (Path loss criterion, used for cell selection and reselection). The range is -99 to 99.
RTL (Radio link timeout).
Timeslot
Indication of the transmitter status
Information on the Network parameters.
TMSI (Temporary Mobile Subscriber Identity).
Cell identification (Cell ID, Number of cells being used).
MCC (Mobile country code)
MCN (Mobile network code)
LAC (Location area code)
Ciphering (On/Off)
Hopping (On/Off)
DTX (On/Off)
Discard cell barred information.
CHECK SIM-LOCK
Note - If you bought your Nokia on UK Vodafone or UK Cellnet you do not need to check this because they both transmit on GSM900, and they don't lock the phones. However if you bought your phone on UK Orange or UK One2one your phone may be blocked. The reason is that they both transmitt on GSM1800. To make a call on GSM1800 you need what is known as a "Dual band" phone. A dual band phone is able to transmit on both GSM900 and GSM1800, so they lock the phones so you can't use it with any other network simcard. If you find that your phone is locked you can try different software to unlock it. (I havn't found one that works yet), or you can ask your service provider who will gladly exchange the 10 digit code for about £35.
This is how to check the status of the 4 different locks. Also don't try entering the wrong number, because after 3 times it will block the phone for good.
There are 4 different locks on your Nokia phone.
COUNTRY-LOCK
NETWORK-LOCK
PROVIDER-LOCK
SIMCARD-LOCK
The code to read out the sim-lock status of your phone is
#PW+(MASTERCODE)+(Y)#
# = DOUBLE-CROSS
W = PRESS "*" THREE TIMES
P = PRESS "*" FOUR TIMES
+ = PRESS "*" TWO TIMES
MASTERCODE = 1234567890
Y = NUMBER 1 TO 4
The master code is a secret code. The code has 10 digits, To read out the sim-lock status you can enter every combination you want!
"Y" Shows the status of the network-lock. Here you can enter a number from "1" to "4". The "4" is for the sim-card lock.
SIM-LOCK CHECKS
#PW+1234567890+1# = GIVES PROVIDER-LOCK STATUS
#PW+1234567890+2# = GIVES NETWORK-LOCK STATUS
#PW+1234567890+3# = GIVES COUNTRY-LOCK STATUS
#PW+1234567890+4# = GIVES SIM-CARD-LOCK STATUS.
VODAFONE "PAY AS U TALK"
If you are on the Vodafone pay as you talk service within the UK, you can check the balance of your friends "Pay as you talk" phone without them even knowing.
What you need to do is very simple indeed, just dial "1345" from your phone. You will then be asked to enter your telephone number. Enter the number of your friends phone, and it tells you how much credit they have left and how many days are remaining.
Remember that both phones need to be on the Vodafone "Pay as you talk" service.
WILDFIRE (NEW ORANGE VOICE MAIL)
Say "Do me a favor" in the main menu (when Wildfire first answers) and she will reply "What kind of favour?". You then appear to have two options:
I'm depressed!
Saying this phrase will make Wildfire issue one of several witty repartees designed to cheer you up. My favorite so far is the one where she plays you an excerpt from a William Shatner album (who played T J Hooker in the high adventure series of the same name!)
What does a cow say?
When you ask this, you hear a cow say MOOOOO. This is very short but funny. Once in a while, when you say this command you will get a VERY FUNNY reply. You know you have it when Wildfire says "Here's what a mad cow says"
The best thing about this Do me a favor menu in my opinion, is that you can get Wildfire on the line whilst you are speaking to a friend, and both you and your friend hear Wildfire talking Of course there is no real use for this menu, but it is a lot of fun and will amaze your friends!
Thanks to SMI-GROUP for this one.
These codes has been tested with version FLD_2C6 G60SB03X of Samsung SGH-600
firmware by David Lopez - (david@jet.es)
SAMSUNG SGH-600 SECRET CODES
============================
*#06# -> Show IMEI
*#9999# -> Show Software Version
*#0001# -> Show Serial Parameters
*2767*3855# -> Full EEPROM Reset ( THIS CODE REMOVES SP-LOCK!!!! but also
change IMEI to 447967-89-400044-0, you must use CHGIMEI to
restore it)
*2767*2878# -> Custom EEEPROM Reset
*#9998*228# -> Battery status (capacity, voltage, temperature)
*#9998*246# -> Program status
*#9998*289# -> Change Alarm Buzzer Frequency
*#9998*324# -> Debug screens
*#9998*364# -> Watchdog
*#9998*377# -> EEPROM Error Stack
*#9998*427# -> Trace Watchdog
*#9998*523# -> Change LCD contrast
*#9998*544# -> Jig detect
*#9998*636# -> Memory status
*#9998*746# -> SIM File Size
*#9998*778# -> SIM Service Table
*#9998*785# -> RTK (Run Time Kernel) errors
*#9998*786# -> Run, Last UP, Last DOWN
*#9998*837# -> Software Version
*#9998*842# -> Test Vibrator
*#9998*862# -> Vocoder Reg
*#9998*872# -> Diag
*#9998*947# -> Reset On Fatal Error
*#9998*999# -> Last/Chk
*#9998*9266# -> Yann debug screen (=Debug Screens?)
*#9998*9999# -> Software version
*0001*s*f*t# -> Changes serial parameters (s=?, f=0,1, t=0,1) (incomplete)
*0002*?# -> unknown
*0003*?# -> unknown


Disable Rightclick Function On Desktop











Do Not Forget Say Thanks
Very useful particularly for home users who want to protect their system default settings against unwanted changes that other users can make. For example changes in system desktop appearance, themes, and screen saver as well as other display settings. Using registry editor, you can disable the right click functionality on desktop to access the "Display Properties" dialog box and this will also prevent users to access windows explorer.

Follow the given steps to disable the right click functionality on desktop:

To use this feature, you will need to be logged into your computer with administrative rights.

Click Start button and type regedit in Run option then press Enter for next.
Here locate the location to:
Here in right side panel, right click to create a new DWORD value with the name NoViewContextMenu (it is case sensitive), then assign number 1 in value data box.
Now close the registry editor and restart your computer after any changes to go into effect.
But next time, if you want to enable right click functionality on desktop then simply change the value of data box or delete the NoViewContextMenu DWORD item.