Tuesday, May 11, 2010

EmulateIE7: make you site rendered like IE7 in IE8

Many times design of your site distorts in IE8. The instant solution to fix this issue is make your site rendered like in IE7 in Internet Explorer 8.0 also. Simply add following tagline inside head tag and make your webpage rendered like IE7 in IE8.

Note that, The X-UA-Compatible tag and header override any existing DOCTYPE. Also, the mode specified by the page takes precedent over the HTTP header.

Tag:

Wednesday, May 5, 2010

Firefox issue: Remove the dotted border around links

The default firefox issue when we use (hyperlink) for text, image or any other html element, it gives border around that element. Though its not a big issue, it looks weird sometime. This can be fixed using simple css formatting.

Use following syntax in css file, which will be applied for all default links.

a:active
{outline: none;}

a:focus
{-moz-outline-style: none;}


Thats it. Save the css file or the html page where you have embedded this code and see the results.

Monday, March 15, 2010

Removing Autorun.Inf is very easy

No need to have windows bootable cd and no need to in regedit everytime you have intorun.inf file in your harddrive. It is generic problem when we connect removable usb flash drives. It doesnt open by double clicking on the 'removable drive' icon in my computer.

I suggest you to install Editplus in your system. It can be found on internet in hardly few Kb's. After installing open it and select the removable disk drive from dropdown list appears at left hand side. It shows number of files contained in that drive. select Autorun.Inf and delete it. make sure you are deleting file not directory by right clicking on 'Autorun.Inf' and saying delete/remove the file.

That's it. now remove the flash/pen drive and reinsert. It will work. Some people suggest to insert xp cd and do lengthy steps or just deleting through command prompt using some cmd syntax. I found this easy method to remove Autorun.Inf file.

Wednesday, February 24, 2010

colorschemer: professional color matching website and application

Dear designer friends, See i'm sharing something for you. hope this will be helpful to you.

Here is the professional color matching website which would be helpful to you in choosing best color combination for your design. Try the given color combinations and design the web page, user interface or any kinda graphics.

Trust me, i tried many color combination and found it really helpful to me while working on web templates.

This site also providing one color matching application ' ColorSchemer Studi
o'. This application works with a dynamic visual color wheel, instantly explore harmony relationships and even let ColorSchemer Studio intelligently suggest color schemes for you! you can download this application for free on this website.

So what are you waiting for... try http://colorschemer.com/

Wednesday, February 17, 2010

Nokia phones secret codes

*#06# for checking the IMEI (International Mobile Equipment Identity).

*#7780# reset to factory settings.

*#67705646# This will clear the LCD display (operator logo).

*#0000# To view software version.

*#2820# Bluetooth device address.

*#746025625# Sim clock allowed status.

*#62209526# - Display the MAC address of the WLAN adapter. This is available only in the newer devices that support WLAN

#pw+1234567890+1# Shows if sim have restrictions.

*#92702689# - takes you to a secret menu where you may find some of the information below:
1. Displays Serial Number.
2. Displays the Month and Year of Manufacture
3. Displays (if there) the date where the phone was purchased (MMYY)
4. Displays the date of the last repair - if found (0000)
5. Shows life timer of phone (time passes since last start)


*#3370# - Enhanced Full Rate Codec (EFR) activation. Increase signal strength, better signal reception. It also help if u want to use GPRS and the service is not responding or too slow. Phone battery will drain faster though.

*#3370* - (EFR) deactivation. Phone will automatically restart. Increase battery life by 30% because phone receives less signal from network.

*#4720#
- Half Rate Codec activation

*#4720* - Half Rate Codec deactivation. The phone will automatically restart

If you forgot wallet code for Nokia S60 phone, use this code reset: *#7370925538#
Note, your data in the wallet will be erased. Phone will ask you the lock code. Default lock code is: 12345

Press *#3925538# to delete the contents and code of wallet.

Unlock service provider: Insert sim, turn phone on and press vol up-arrow keys) for 3 seconds, should say pin code. Press C, then press * message should flash, press * again and 04*pin*pin*pin#

*#7328748263373738# resets security code. Default security code is 12345

Tuesday, February 9, 2010

Memory card corrupted..Try this before buying new card..!!



Hey, your mmc got corrupted, going to buy a new one? Stop here and see it. you can try to repair it.

All the memory card are based on the FAT file system and not the FAT32 or NTFS file system. for repairing you will need a corrupted mmc, a mmc reader, and a PC, obviously.

1) Insert your card in the mmc reader.
2) Find the drive in which it is inserted from your pc.
3) Right click the selected drive and select FORMAT but NOT quick format.
4) Now, in the file system selection part, select the file system to be FAT and not FAT 32 or NTFS file system.
5) Start formatting.

You can also do this by using Windows Explorer. HAPPY FORMATTING!

Friday, February 5, 2010

Photo retouching using Photoshop: Its Simple..!!

Here are simple steps im usually following to retouch the photos. There might be some more easy and more effective ways that this. You can have your own procedure, but spend some time and try this too.

Here are the steps:
1. Take a photo you want to edit/retouch and Open in photoshop. Fig. below shows a photo im goin to edit (fig.1).
You can see the dark circles and marks on the face (fig 2).


2. Create a copy of the layer which will help you to compare retouched photo with old(existing) photo. Take one
more copy of the layer. (Now you have 2 layers with one Background layer.)

3. Now, use gaussian blur filer on the uppermost layer of the image. (amount of blur will varry depend on
photo's quality, light. Make sure that its not affecting the pixel value of image, and skin color tone is
easily visible.)
Note that, our eyes understands the difference with the blured edges of the characters or objects in the photo. Figure below is the same photo with gaussion blur.

Figure 3

4. Now, Use eraser tool (E) and remove the edges of the object (or body parts of the character) as shown in the following figure. Make sure to remove blured effect from lips, eyes, hairs, chin edges, neck edges and clothes for the character.

figure4

5. Now merge the upper layer with following layers (dont merge with background) .

6. adjust the light with Use the curves (ctrl+m) option. I suggest not to use brightness and contrast option as
it affects on whole image and degrade the quality.

That's it. See the the difference by hiding the merged layer. Now old image is there in background and the
layer is having retouched image.


Try this, it really works. These are simple steps to use and retouch the photo at home within a short time. There are other more effective but time consuming method.


Monday, November 30, 2009

CSS Sprites

CSS sprites are a way to reduce the number of HTTP requests made for image resources referenced by your site. Images are combined into one larger image at defined X and Y coorindates. Having assigned this generated image to relevant page elements the background-position CSS property can then be used to shift the visible area to the required component image.

This technique can be very effective for improving site performance, particularly in situations where many small images, such as menu icons, are used. This can be used for creating multiple Menus with normal and hover background images or multiple logos ( i.e. clientele page logos).

Following figure is the set of icons with normal and hover state. Using this image in a background and adjusting its x and y positions on hover state will give you final result. That means, instead of having 6 different icons (3 for each normal state and 3 for hover) we can have one single image with its position adjusted thorugh css class. It helps to reduce number of http requests being sent to server.



CSS sprites compatible with each and every browsers if it is used with proper syntax and proper html stucture. No need to use css fixes. I have tested it on IE6, IE7, Mozilla firefox 2, 3, opera, Google chrome and Safari.

Saturday, October 17, 2009

Protect your computer from Threats

Types of Threats
Worms
This malicious program category largely exploits operating system vulnerabilities to spread itself. The class was named for the way the worms crawl from computer to computer, using networks and e-mail. This feature gives many worms a rather high speed in spreading themselves.

Viruses
Programs that infected other programs, adding their own code to them to gain control of the infected files when they are opened. This simple definition explains the fundamental action performed by a virus - infection.

Trojans
Programs that carry out unauthorized actions on computers, such as deleting information on drives, making the system hang, stealing confidential information, etc. This class of malicious program is not a virus in the traditional sense of the word (meaning it does not infect other computers or data). Trojans cannot break into computers on their own and are spread by hackers, who disguise them as regular software. The damage that they incur can exceed that done by traditional virus attacks by several fold.

Spyware
Software that collects information about a particular user or organization without their knowledge. You might never guess that you have spyware installed on your computer.

Riskware
Potentially dangerous applications include software that has not malicious features but could form part of the development environment for malicious programs or could be used by hackers as auxiliary components for malicious programs.

Rootkits
Utilities used to conceal malicious activity. They mask malicious programs to keep anti-virus programs from detecting them. Rootkits modify the operating system on the computer and alter its basic functions to hide its own existence and actions that the hacker undertakes on the infected computer.


Sources of Threats

A person, a group of people, or even some phenomena unrelated to human activity can serve as an information security threat. Following from this, all threat sources break down into three groups:

The human factor. This group of threats concerns the actions of people with authorized or unauthorized access to information. Threats in this group can be divided into:
  • External, including cyber criminals, hackers, internet scams, unprincipled partners, and criminal structures.
  • Internal, including actions of company staff and users of home PCs. Actions taken by this group could be deliberate or accidental.
The technological factor. This threat group is connected with technical problems - equipment used becoming obsolete and poor-quality software and hardware for processing information. This all leads to equipment failure and often to data loss.

The natural-disaster factor. This threat group includes any number of events brought on by nature and other events independent of human activity.



How threats spread

As modern computer technology and communications tools develop, hackers have more opportunities for spreading threats. Let's take a closer look at them:


- The Internet
The Internet is unique, since it is no one's property and has no geographical borders. In many ways, this has promoted development of countless web resources and the exchange of information. Today, anyone can access data on the Internet or create their own webpage.
However, these very features of the worldwide web give hackers the ability to commit crimes on the Internet, making them difficult to detect and punish as they go.

- USB flash drives
USB flash drives are widely used for storing and transmitting information.
When you use a USB disk that has malicious programs on it, you can damage data stored on your computer and spread the virus to your computer's other drives or other computers on the network.


Tips to protect yourself from malware

Be mindful of what you are clicking on

Many websites that hosts harmful content will use banners and pop up advertisements, pretending to be an error messages or offering you a prize. When you visit these sites harmful content is downloaded into your computer. Avoid being tempted in the first place.

Be aware of what you are downloading
Don’t download software from a website that’s full of advertisements, or listings of ‘free’ programs, these are often fake files. Be cautious and question them, scan them with security software prior to opening or only download programs from reputable or corporate websites.

Purchase security software
Many users are not aware that using pirated software can not protect user' computer against threats and the pirated software from unauthorized third parties may contain viruses.

Be careful before you open your removable media
Many malicious programs attack your computers and spread via USB storage. USB Disk Security can protect your computer against any threats via removable media.

Update Windows when prompted
Microsoft release updates for Windows regularly. They include important security patches and tools. Install them when prompted to patch up security gaps in your operating system, browser or third party software.

Take extra care when using Peer-To-Peer programs
Since files shared on P2P networks are not policed. Anyone can release anything they want via this medium. As such get into the habit of scanning the files you downloaded before running/executing them.

Accept incoming files when you expect them and from people that you know
Some threats have the ability to infect machines and automatically send copies of themselves to that user's contact list. It may appear that your friend is sending you a file but it may turn out to be a malicious program propagating itself.

Know your File Formats
Images usually come in .jpg .jpeg .png .bmp .gif .tif formats. Executables come in .exe .bat .com .dll formats. If someone says they are sending you a photo but the file ends with .exe or .com, please do not open it. They’re obviously mistaken or potentially endangering you.

Be aware of what’s happening
There are various places to seek for help and learn more about your computer. It pays to be knowledgeable on your computer, as malicious threats often take advantage of those who are unaware of what’s happening.

Sunday, September 27, 2009

Computer Random Hang-up Problem

You may have experienced having your computer intermittently hangs-up, or may re-boot itself for no apparent reason. This can be annoying, and can mean you have lost valuable work that you we in the process of creating.
If this has happened once, then your chances of explaining the cause are remote in the extreme. If you find it happening regularly, then it is clearly in your interest to find and fix the problem.

There are a few things you can check for yourself that may save you a trip to the repair shop.
With most modern computers, the system comes with built in circuitry to monitor the state of the computer. One of the checks built into your system is to test the operating temperature. The computer may shut down if this moves outside the desirable operating range.

For your system to run at the correct operating temperature it is important that air circulates freely in and around the case. If you have the computer case installed inside an enclosure, then this may be the first thing to consider changing. Similarly, I have seen computers covered with books, manuals and paper documents. These again can hinder air circulation, and these items should be removed. Take a look at the slotted vents in the sides of the case. These slots can become blocked by an accumulation of dust. Because the computer is usually always drawing some power, it has a constant electrostatic charge. A computer is second only to a vacuum cleaner in its ability to suck in dust and fluff.

Taking the cover of the case will also show the dust build-up inside the computer. Be careful removing dust accumulations from internal components. This is probably best done with a soft artist̢۪s brush or an aerosol can of compressed air.

Next, take a look at the internal cooling fans. Modern computer usually have a cooling fan perched on top of the processor. This fan should be clear of dust, and running freely, without obvious scraping noises, when the computer is operating. It is OK to start the computer with the case cover removed, just be careful not to poke things into the various components. There will also be a cooling fan inside or attached to the power supply. This again should be free of dust and running freely. Some computers may also have an additional case fan. This will be screwed on over one of the slotted case vents, and typically be running from a cable connected to the mother board. Not all machines have a separate case fan, but if it is there, it is there for a reason. Apply the same checks to this fan.

If you have identified faults with your cooling fans, this may require a trip to your local repair shop. The repair technician may also suggest that the CPU heat sink be removed and re-placed with fresh heat transfer compound, which is a straightforward job for an experienced repairer.

Fraud prevention on credit card - Do’s & Don’ts

Many people may have an email from Citibank on very important tips about how to prevent fraud on credit card. I thought I should share this cool tips with everyone as I believed most of us are carrying as least one credit (some even more) in our purse or wallet or pocket. As what mentioned in the email, “As the credit card is a very powerful tool, it is important that you know how to protect yourself and learn how to prevent fraud in order to ensure that you truly enjoy the benefits it has to offer”. YES! This is our responsibility to protect our own interest. Here goes the Do’s & Don’ts….

(right click and open in new tab/window to view full image)





Tips for reworking your mobile phones after being dropped in water

People cannot imagine a day without their mobile phones nowadays with phones occupying a very significant place in our lives. Mobile phones are prone to damage due to their rampant usage as also many times we have observed that there is whole lot of mayhem when it is dropped in the water. Well here are the 7 useful tips for bringing your mobile phone back to normalcy after it has been dropped into the water.

  1. The first step you need to take is the immediate shutting off your mobile once it is recovered, although in most cases you will not have to do that as they itself get off automatically. Patience pays off - do not dare to experiment anything new and test the phone whether it is working or not until the phone is absolutely dry which takes around 2-4 days generally.
  2. Then you need to remove all its vital parts that include a battery, phone covers, faceplates, SIM card and others.
  3. The next big step includes the removal of salt as soon as possible which will demand a bottle filled of distilled water. You actually need to re-submerge the phone to make sure that the metals in your phone are immune from the rust problem. I say it again as you do not dare to check whether the phone is in the working condition or not.
  4. Then pleasingly soak all the parts of the phone with distilled water except for the SIM card and battery as also the LCD screens.
  5. Take help of the direct sunlight as you need to keep the device to air dry for 2-3 days under direct sunlight. Do not in any case, attempt to experiment and use a hair dryer for providing immediate heat to fasten the process.
  6. For those who are in a big hurry, use a electronics cleaner as also rubbing alcohol in place of distilled water.
  7. Last but not the least, you will observe a miracle after 2-4 days of air drying the device as you need to plug it into the charger or battery and then test the device. Hopefully your patience will pay off!!!

Believe me, the method is a tested one.

Wednesday, September 9, 2009

Windows startup Time Errors: simple ways to resolve them

Missing DLL files??



Sometimes you get error message as soon your windows starts and desktop displays. This error message is something like, This application has failed to start because (whatever name).dll file is not found. I observed that many people just use there bootable CDs to repair the OS or Reinstalls it. Its a bad habit to reinstall the OS everytime for such small errors. This is nothing but the specified .dll file is currupted or deleted from your system.
  1. Simple procedure to resolve this issus is inserting the missing .DLL file into C:/windows/system32/ folder.
  2. Search for that missing file on internet and you can easily get free .DLL file.
  3. copy it and restart the machine.
  4. If its showing another missing files, install all those and restart the machine.

That's it..!!

Sunday, September 6, 2009

Sunday, August 30, 2009

Access Google Search, Youtube, gmail, orkut, Blogger on your mobile

Now Access Gmail, Youtube, Blogger and search on google by a single click. No need to login everytime. Just install the application to your phone and access it anytime... anywhere.

How to install:

Using web:
  1. Click on the followin link and install respective application.
    http://www.google.com/mobile/#p=default
  2. Select the country of residence and type your mobile number in given text bos.
  3. Click on 'Send me a link'
  4. Link will be sent to you within a minute. (Depending on internet and mobile network's speed)


Using Wap:

  1. Go to http://www.google.com/mobile/ using wap browser and click on the application you want.
  2. It directly downloads and installs application to your mobile in 'applications' folder.
  3. Please follow the given installiation procedure on your cellphone.

Now unblock the USB drive within a few seconds..

It is easy to lock a machine down, disable the floppy, and cdrom in the bios. Many times when you try to disable USB - it disables it entirely.

This can be a real pain on newer laptops or systems that don't even have a PS2 interface for the mouse or keyboard.
There is a simple registry change that will keep the USB storage drivers from starting when the system boots. Keeps people from walking up to a PC and copying data off with a USB key, but allows you to keep your scanner, keyboard, and mouse working.
As always - back your system up before messing around in the registry.

Just open regedit (or go to Run => regedit) and browse to this key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor
Notice the value 'Start'
Switch this value to 4, and USB storage devices are disabled.
Switch this value to 3, and USB storage devices are enabled.
You are done. Plug the USB and access USB drive now..

How to check if your Anti Virus is working..

Most of the time we just install the Anti Virus or the anti Malware programs and relax that they are working fine and one fine morning you see things not working and finally you realize that its your anti virus program which was not working at all. Here is a small test which you can do in case you are not sure if your anti virus program is working fine or not.
  1. Open Notepad and paste this string into it ( without double quotes and spaces):
    “X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-
    ANTIVIRUS-TEST-FILE!$H+H* ”
  2. Save it and as soon as you do your antivirus real time protection should be able to detect it. In case you have disabled the real time protection run a scan for this file.
    This file actually is a dummy virus which simulates like a virus which is provided by EICAR for distribution as the “EICAR Standard Anti-Virus Test File”, The file is a legitimate DOS program, and produces sensible results when run (it prints the message “EICAR-STANDARD-ANTIVIRUS-TEST-FILE!”).



Saturday, August 29, 2009

Keep your computer Optimized for peak performance

Our personal computers are like fine automobiles—they need preventive maintenance to run efficiently and avoid major breakdowns.
The following tips can help improve your computer's performance. These examples use Microsoft Windows XP.

Clean up disk errors (Run once a week)

Whenever a program crashes, or you experience some power outage, your computer may create errors on your computer's hard disk. Over time, the errors can slow your computer. Luckily, the Windows operating system includes a Disk Check program to check and clean any errors on your computer and keep it running smoothly.



To run Disk Check:

  1. In your Start menu, click My Computer.
  2. In the My Computer dialog box, right-click on the drive you wish to check for errors (for most of us this will be the C: drive, unless you have multiple drives on your computer), and click Properties.
  3. In the Properties dialog box, click the Tools tab. In the Error-Checking section, press the Check Now… button. A Check Disk dialog box displays, as shown below.
  4. In the Check Disk dialog box, check all the check boxes. Click Start.
  5. You will see a message box that says you can schedule the disk check to start the next time you restart your computer. Click Yes. The next time you restart your computer, it will automatically run through a disk check before displaying your login screen. After the disk check finishes, Windows will automatically bring you to your login screen.

Note: Check Disk can take more than an hour to check and clean errors on your computer.



Remove temporary files (Run once a week)
Your computer can pick up and store temporary files when you're looking at Web pages and even when you're working on files in programs, such as Microsoft Word. Over time, these files will slow your computer's performance. You can use the Windows Disk Cleanup screen to rid your computer of these deadbeat files.






To run Disk Cleanup:

  1. In your Start menu, click My Computer.
  2. In the My Computer dialog box, right-click on the drive you wish to check for errors (for most of us this will be the C: drive, unless you have multiple drives on your computer), and click Properties.
  3. In the Properties dialog box, click Disk Cleanup.
  4. Disk Cleanup will calculate how much space you can free up on your hard drive. After its scan, the Disk Cleanup dialog box reports a list of files you can remove from your computer, as pictured below. This scan can take a while depending on how many files you have lying around on your computer.
  5. After the scan is complete, in the Disk Cleanup dialog box, click View Files to see what Disk Cleanup will throw out once you give it the go ahead. You can check and uncheck boxes to define what you wish to keep or discard. When you're ready, click OK.
  6. You can also select the More Options tab within the Disk Cleanup screen to look for software programs you don't use much anymore. You then have the choice to remove these unused programs.

Rearrange your data (Run once a month)

Don't be shocked, but your computer can get sloppy. Your computer often breaks files side by side to increase the speed of access and retrieval. However, as files are updated, your computer saves these updates on the largest space available on the hard drive, often found far away from the other adjacent sectors of the file.

The result: a fragmented file. Fragmented files cause slower performance. This is because your computer must now search for all of the file's parts. In other words, your computer knows where all the pieces are, but putting them back together, and in the correct order when you need them, can slow your computer down.

Windows includes a Disk Defragmenter program to piece all your files back together again (if only Humpty-Dumpty had been so lucky) and make them quicker to open.



To run the Disk Defragmenter:

  1. In your Start menu, click My Computer.
  2. In the My Computer dialog box, right-click on the drive you wish to check for errors (for most of us this will be the C: drive, unless you have multiple drives on your computer), and click Properties.
  3. In the Properties dialog box, click the Tools tab, and then in the Defragmentation section, click Defragment Now….
  4. In the Disk Defragmenter dialog box, select the Volume (most likely your Local Disk C:) at the top of the screen, and then click Analyze.
  5. After analyzing your computer, the Disk Defragmenter displays a message stating whether you should defragment your computer. Press Defragment to clean up your computer if necessary. The Disk Defragmenter will reorganize files by placing together and organizing them by program and size, as shown in Figure 5.

Make Internet Explorer run faster

The Web is a sparkling achievement of modern society. It's everywhere?from the home to the classroom. We use it to communicate, to work, to play?even to waste time when there's nothing else to do.

Yet there's nothing more frustrating than having this technical marvel at our fingertips 24 hours a day, 7 days a week, only to watch our computers access the Internet at a crawling pace. Thankfully, Microsoft Internet Explorer provides some useful options for quicker Web surfing. Let's look at these options now.

Reduce the size of your Web page history
Internet Explorer stores visited Web pages to your computer, organizing them within a page history by day. While it's useful to keep a couple days of Web history within your computer, there's no need to store more than a week's worth. Any more than that and you're collecting Web pages that will slow down your computer's performance.



To reduce your Web page history:


  1. In Internet Explorer, on the Tools menu, click Internet Options.
  2. In the Internet Options dialog box, in the History section, find the Days to keep pages in history: box. Type "1" in this box, as pictured in the image below. Click OK.

Don't save encrypted Web pages
Encrypted Web pages ask for usernames and passwords. These pages scramble information to prevent the reading of this sensitive information. You can define Internet Explorer to not save these types of pages. You'll free up space by saving fewer files to your computer, as well as keeping secure information off your computer.



To not save encrypted Web pages:

  1. In Internet Explorer, on the Tools menu, click Internet Options.
  2. In the Internet Options dialog box, click the Advanced tab.
  3. In the Settings section, scroll down to the Security section. Check the "Do not save encrypted pages to disk" option, as shown in the figure below. Click OK.

Install antivirus and antispyware programs
Computer viruses and spyware (hidden software that gathers information about you without your knowledge or consent when you're using a computer) both reduce system performance. Computer viruses can not only reduce performance, but they can also destroy data. Any computer that accesses the Internet should have antivirus and antispyware programs installed.

Saturday, August 15, 2009

Free Symbian Tricks And Tips




Tip 1 : Do u know how to use the edit button (abc or pencil button)?Heres how... in the inbox for example; u wanna delete multiple sms, simply hold the edit button, scroll down, and then, press c to delete the marked sms. The edit button can also b used to copy and past text in sms, simply hold it and scroll across, choose copy. pretty good for placing song names in ngages.

Tip 2 : Shit happens, on a smartphone, its inevitable u do something wrong, and tis calls for a format of fone. to format the fone, press *#7370#, then enter the lock code, which is the sec code of the fone. NOTE: batt must b full, else if format is disrupted by low batt, consequences will b disatrous I heard the code *#7780# works too, pretty much the same i tink.
for 6600 users, to format the fone, theres an alternative way. Press and hold <3>, <*>, and the buttons, then power on fone, keep holding on the 3 buttons, till u come to a format screen. tis method ONLY works on 6600, and need not enter the sec code. BUT sec code wun be reset to default 12345.

Tip 3 : TO NGAGE USERS; Did u know u can install .sis files simply using the cable given? Juz plug it in, place the .sis file anywhere on e: (the mmc), not in any folders, root of e:, disconnect, then look for it in manager.

Tip 4: Save on battery and system memory being used by regulary checking the task manager which can be accessed by holding down the menu button!!

Tip 5: Type *#06# to display your IMEI serial number, very valuable for the unlocking your phone to other sim cards

Tip 6: Type *#0000# to view which firmware version you are running

Tip 4a: Set the screen saver to a short time out period to prolong battery life.Tip 4b: Avoid restarting the phone, or repeatedly turning it on and off. This helps increase battery life.

Tip 7: If you would like to avoid being "blue jacked", keep bluetooth turned off, or set your phone's visibility to hidden.

Tip 8: Don't want to carry a watch and a phone? Set the screen saver to show date and time, then you can ditch the watch.

Tip 9: Save memory when installing apps, by installing over bluetooth. This can be done using the nokia phone suite and a bluetooth serial connection. Only works with .SIS files, so java still has to be sent to the phone, but will save space when using .SIS files.

Tip 10: Operator logosUse a filemanager like FExplorer or SeleQ to add the folders: "c:/system/Apps/phone/oplogo". Add a .bmp picture to folder "oplogo" and restart your phone! The .bmp picture size needs to be: 97 x 25 pixels

Tip 11: Check if the recepients phone is onDelivery reports
or
Type *0# your message in the message composer window space then write your message, the recipient will not see the star zero hash bit - just the message When they read it it will relay a message back to your fone showing the time they recieved it. (haven't yet tried it myself though)

Tip 12: BlueJacking
First up, you need to know what Bluetooth is. There are lots of types of modern devices that incorporate Bluetooth as one of their many features. PDAs, mobile phones and laptops are a few of these modern devices. Bluetooth means that Bluetooth enabled devices can send things like phonebook/address book contacts, pictures & notes to other Bluetooth enabled devices wirelessly over a range of about 10 metres. So, we've got past the boring part. Now, using a phone with Bluetooth, you can create a phonebook contact and write a message, eg. 'Hello, you've been bluejacked', in the 'Name' field. Then you can search for other phones with Bluetooth and send that phonebook contact to them. On their phone, a message will popup saying "'Hello, you've been bluejacked' has just been received by Bluetooth" or something along those lines. For most 'victims' they will have no idea as to how the message appeared on their phone.

Tip 13: While you are viewing a picture in your phone's gallery, press one of these shortcut keys (definitely works on 6600, not sure about other symbians)1 - turn image anticlockwise3 - turn image clockwise* - toggle on/off of full screen5 - zoom in0 - zoom out

Tip 14: u can select all files in a folder by selecting THE folder and copy it then paste it somewhere. however u need to make a new directory. fexplorer wun let u copy that folder together. well seleQ can mark files to copy but it really takes time!

Tip 15: A soft and Hard resetA Soft-reset - the process of resetting all the settings of the phone to the factory default! No applications are deleted! A Hard-reset is like formatting a drive! It does format the memory. Everything that has been installed after the first use of the phone is deleted! It will recover the memory of the phone to the state you purchased it! It is done by inputing the following code: *#7370# NOTE: The battery must be full or the charger has to be connected to the phone so that it does not run out of power and make the phone unusable.

Tip 16: Formats of images
supported ones: JPG UPF GIF87a/89a WBMB MBM TIFF/F PNG EXIF
How to copy & paste text in your Nokia 3650: Press and hold the pencil key and select your text using the scroll key.Left function key will change to 'Copy'. Press it to copy the selected text to clipboard.You can paste the clipboard contents the same way:press and hold the pencil key and press 'Paste'. Or, press pencil key once and select 'Paste'.
Press and hold the Menu key to open the application switching window, where you can *duh* switch between applications. If a program hangs and you can't shut it down, select the application in theapplication switching window and press 'C' to kill it. It's also a faster way to exit programs.

Turn on/off the "click" sound made by the camera by selecting the 'Silent' profile or by turning warning tones on/off:Menu > Profiles > "select your activated profile" > Personalise > Warning tones > On/Off.(This also effects the sound of Java games and apps).

To change background image go to:Menu > Tools > Settings > Phone > Standby mode > Background image > Yes > "choose an image".The best size for background images is 174x132 pixels.

Only got blue, green and purple in your 3650 colour palette?This free app adds 3 more colours: Palette Extender.
Display an image when someone's calling:Menu > Contacts > "select a contact card" > Options > Edit > Options > Add thumbnail > "choose an image".

Add a personal ringing tone to a contact:Menu > Contacts > "select a contact card" > Options > Open > Options > Ringing tone > "choose a ringing tone".

Delete all messages from your Inbox at once:Menu > Messaging > Inbox > Options > Mark/Unmark > Mark all > Options > Delete.

Send or hide your caller ID: Go to: Menu > Tools > Settings > Call > Send MyCaller ID > 'Yes', 'No' or 'Set By Network' to follow the default settings of your home network.

If you often copy large files to your MultiMedia Card, I recommend a card reader.E.g. With a card reader it takes only 12 seconds to copy a 10 MB file!

Record the sound of a phone call using the (sound) Recorder.Menu > Extra's > Recorder > Options > Record sound clip.Note: short beeps are audible during call registration.But there is a 60 second limitation so if you want unlimited sound recording get this app: Extended Recorder.

While writing text, press "#" to switch between upper and lower case and Dictonary on/off (predictive text input). Press and hold "#" to switch between Alpha mode and Number mode.

Keyboard shortcuts for zooming and rotating images in Images: 1 = zoom in, 0 = zoom out, press and hold to return to the normal view.2 = rotate anticlockwise, 9 = rotate clockwise, * = full screen.

In standby mode, press and hold the right soft key to activate voice dialling.To add a voice tag to a phone number, open a contact card and scroll to the phone number and select:Options > Add voice tag.

You can customize both soft keys located below the screen (in standby mode):Menu > Tools > Settings > Phone > Standby mode > Left/Right selection key > "select an application".

In standby mode. press scroll key center (joystick) to go directly to Contacts.

In standby mode, press and hold 0 to launch your wap home page.

In Menu or any subfolder, press numbers 1 - 9 to start the application at that location.123456789

In standby mode,45# + dials the number on your sim in memory slot 45.50# + dials slot 50 and so on.

If you have your keylock activated just press the on/off button to turn on your backlightto look at the time when it's dark without having to unlock the keypad.

Never, ever, in your whole life, install WildSkinz on your Nokia 3650!!! WildSkinz screws upthe whole 3650 system. It was never intended to work on the 3650, only on the 7650

Web Designing: Scope, Tips while creating your website


Scope of web designing

Web designing is very essential and important part of IT industry. There are various skills required while designing a web site. A web designer must have proper knowledge of the contents which are required to be covered in the website. Graphics i.e. colors, patterns, textures and effects should always been clear and effective. There should not be a hint of impatience in your design.

There should be proper symmetry between curves, distances between buttons, links etc. A person should have complete knowledge of CSS and HTML.
A web designing has very wide scope in IT industry. It is basically dependent of the skills of the web designer. Conceptual designing also plays an important role in designing a web site.Links help in increasing the traffic for a web site.

A web designing is an art. It requires domain name registration, hosting, proper layout and promotion. Every activity which is associated with the designing of a website requires proper qualification and experience.
Today every small or big industry requires a media to catch the attention of the proposed consumers.
Similarly, educational institutes want to impart knowledge to their students through a medium which can make them accessible with variety of knowledge with just a mouse click.

This requirement has been fulfilled by the internet which offers various sites. Any type of information can be easily accessed by opening the particular site.

All these have made web designing industry more popular and it has further increased its scope. There is no field left where internet has not made its entry. Support of web designing industry in providing every bit of service right from content writing to site launching have been very advantageous to the various customers.
Web designing industry has earned a good name in past few decades. The needs of business, industry, education and public sector have made very good use of web services.

There are more jobs available for web designers than before. There are lots of companies who have earned a good name in providing web designing services to people. They employ professional who have good knowledge and experience.

Lots of new companies have been coming up. Ecommerce solutions which are part of web designing have made shopping on net easy and convenient.

Lots of solutions have been provided by the web designers to the people who want details about any subject. There is no field left on which you cannot easily find a good piece of knowledge.

It is no child play to be able to adjust in today’s world of competition. There is great need of the experience and professionalism that can make web designing successful. If you provide good services to what your customer demand you can easily survive the market conditions.

Effective presentation of website and proper promotion are the key things which are required to make website more accessible.

Web designing industry is likely to grow at more speed in near future. That time in not far enough, when this industry will be the number one industry of every nation.


Tips
These are five things to avoid when making websites or web pages. Avoiding these five steps should ensure a successful web site.

  1. Don't make your site hard to navigate around. When making your first website people don't often tend to follow any set of rules and this can result in an unorganized and messy site. Typical sites have a clear menu that stands out from the rest of the page. People visiting your site do not want the hassle of searching your entire pages to try and find links to other pages. The best places to place your menu are in the left or right column or the top of your site. Since most sites today have their menus located in these places, people have got used to this format. You do not want your visitors to feel uncomfortable.
  2. Never forget alternate text for any images, logos or menus. Sometimes files do not load properly or people disable images and without proper alt labeling your site can become useless.
  3. Do not add too many graphics and any other multimedia. Adding too much to a site can create chaos. Pages freezing, loading slow, or not even at all will be the result. Visitors will become frustrated with too many different things on the screen and will just want to leave. Many people do not own cable or DSL connections and loading all these extra graphics will take forever.
  4. Do not use content without permission. Many people new to the web publishing do not understand that taking other peoples content is not allowed. There is speculation that Google penalizes websites with duplicate content because it only wants fresh content and not re used and hashed information. However if you must use someone elses content you must give them credit.
  5. Try not to limit your audience. Try and code your pages to follow one type of markup that is accepted by the majority of browsers. Having this neat menu on your page that only works in Opera can be pretty useless since they only hold about 2% of the browser share.

Take into consideration these tips and you will have a successful site for years to come.

Why it Doesn't Matter How Your Website Looks If You Have No Traffic Coming to It
When people get started on the Internet for the first time they have the wrong idea on how to market. They worry too much about how their website looks and they probably don't even have any traffic coming to it. The lesson that I have learned from my years online is that you do not have to be fancy when building a website.

The first thing you have to focus on is finding a way to get traffic to your website. Once you are able to do this then you can dedicate the time to upgrading the website and make it look better but it really does not matter when you're not getting any traffic. You can actually make a website that is captivating and at the same time simple instead of fancy.

You would not believe how many people worry about how the website looks and the last thing they do is try to get ways to drive traffic to it. I have seen many websites that may not be the best but they are still being successful because of the amount of traffic that they drive to it.

As I mentioned before it is good to have a good-looking website but is not good to waste all your time trying to do this because then you will only be left with a website with no traffic. It has to be a balance between having traffic to your page and dedicating time to creating a better looking website. My suggestion is when you first get started the last thing in your mind should be how it looks instead it should be how to drive more traffic to it. There will be many ways for you to promote your website on the Internet just make sure that the method you choose is an effective one.

Web2.0 Technology



Web2.0 Technology

Introduction
"Web 2.0" refers to the second generation of web development and web design that facilitates information sharing, interoperability, user-centered design and collaboration on the World Wide Web. The advent of Web 2.0 led to the development and evolution of web-based communities, hosted services, and web applications. Examples include social-networking sites, video-sharing sites, wikis, blogs, mashups and folksonomies.

The term is now closely associated with Tim O'Reilly because of the O'Reilly Media Web 2.0 conference in 2004. Although the term suggests a new version of the World Wide Web, it does not refer to an update to any technical specifications, but rather to cumulative changes in the ways software developers and end-users use the Web. Whether Web 2.0 is qualitatively different from prior web technologies has been challenged by World Wide Web inventor Tim Berners-Lee who called the term a "piece of jargon".

Web 2.0 websites typically include some of the following features/techniques.

Search:
The ease of finding information through keyword search.

Links:
Ad-hoc guides to other relevant information.

Authoring :
The ability to create constantly updating content over a platform that is shifted from being the creation of a few to being constantly updated, interlinked work. In wikis, the content is iterative in the sense that users undo and redo each other's work. In blogs, content is cumulative in that posts and comments of individuals are accumulated over time.

Tags:
Categorization of content by creating tags: simple, one-word user-determined descriptions to facilitate searching and avoid rigid, pre-made categories.

Extensions:
Powerful algorithms that leverage the Web as an application platform as well as a document server.

Signals:
The use of RSS technology to rapidly notify users of content changes.

How it works

The client-side/web browser technologies typically used in Web 2.0 development are Asynchronous JavaScript and XML (Ajax), Adobe Flash, and Javascript/Ajax frameworks such as YUI (Yahoo User Interface Library), Dojo, Mootools, and jQuery. Ajax programming uses JavaScript to upload and download new data from the web server without undergoing a full page reload.

The data fetched by an Ajax request is typically formatted in XML or JSON (Javascript Object Notation) format, two widely used structured data formats. Since both of these formats are natively understood by Javascript, a programmer can easily use them to transmit structured data in their web application. When this data is received via Ajax, the Javascript program then uses the Document Object Model (DOM) to dynamically update the web page based on the new data, allowing for a rapid and interactive user experience.

Adobe Flash is another technology often used in Web 2.0 applications. As a widely available plugin independent of W3C (World Web Consortium, the governing body of web standards and protocols), standards, Flash is capable of doing many things which are not currently possible in HTML, the language used to construct web pages. Of Flash's many capabilities, the most commonly used in Web 2.0 is its ability to play audio and video files. This fact alone has allowed for the creation of cutting edge Web 2.0 sites such as Youtube, where rich media is gracefully integrated with standard HTML.

In addition to Flash and Ajax, Javascript/Ajax frameworks have recently become a very popular means of creating Web 2.0 sites. At their core, these frameworks do not use technology any different from Javascript, Ajax, and the DOM. What frameworks do is smooth over inconsistencies between web browsers and extend the functionality available to developers. Many of them also come with customizable, prefabricated 'widgets' that accomplish such common tasks as picking a date from a calendar, displaying a data chart, making a tabbed panel, etc.On the server side, Web 2.0 uses many of the same technologies as Web 1.0. Languages such as PHP, Perl, Python, and ASP are used by developers to dynamically output data using information from files and databases. What has begun to change in Web 2.0 is the way this data is formatted. In the early days of the internet, there was little need for different websites to communicate with each other and share data. In the new 'participatory web', however, sharing data between sites has become an essential capability. To share its data with other sites, a web site must be able to generate output in machine-readable formats such as XML, RSS, and JSON. When a site's data is available in one of these formats, another website can use it to integrate a portion of that site's functionality into itself, linking the two together. When this design pattern is implemented, it ultimately leads to data that is both easier to find and more thoroughly categorized, a hallmark of the philosophy behind the Web 2.0 movement.

Saturday, June 6, 2009

How Obama Will Use Web Technology

President Barack Obama was sworn into office this week as our nation’s 44th president. Despite running into a few technical challenges in the first few days at the White House, the Obama Administration will embrace technology in unprecedented ways. Led by forward thinking, web savvy technologists, President Obama’s new media team looks poised and ready to fulfill President Obama’s vision of open-source democracy.
Coincident with Mr. Obama being sworn in, the Obama Administration’s new media team assumed control of WhiteHouse.gov at 12:01 PM EST on Tuesday. This is the official website of the sitting administration. The new media team has identified three top priorities of the new administration – communication, transparency and participation. Let’s examine how the new administration has been leveraging web technologies to meet these priorities.
Communication. This administration’s use of Google’s YouTube during both the campaign and after winning the election leverages Internet video to reach a generation of Americans and global citizens who no longer tune in to AM radio on a regular basis. President Obama has vowed to continue video recording his fireside chats and publishing them via YouTube and other video sites. With the transition of WhiteHouse.gov to the new administration, for the first time ever an official White House blog came online. You can sign up for email updates from the president. Through the blog, Mr. Obama is the first U.S. president to have an RSS feed!
During the campaign President Obama relied heavily on Facebook, Myspace and Twitter to build support, communicate with constituents and develop a core audience. By far, Mr. Obama has more followers on Twitter than anyone else (168,000). His fan page on Facebook has more than 4 million fans.
Transparency. Mr. Obama promises to run the most open, honest and transparent administration to date. Through the Your Seat at The Table section on the CHANGE.GOV transition site, the Obama transition team posted the minutes of hundreds of private meetings with then President-Elect Obama.
Even all of the content on the CHANGE.GOV site, unless otherwise noted, is licensed to the public at large via a Creative Commons Attribution 3.0 License.
The Obama-Biden Transition Team used my company, blist, to disclose the names of all donors to the transition project. Two key points of note are that the disclosure was entirely voluntary and the tool they chose to use made the data itself much more consumable by the mainstream public. Compared to a plain HTML table, which is bulky, cumbersome and hard to work with, by publishing the data via a blist widget the data can easily be sorted, searched, filtered, downloaded, printed, emailed and even republished – all capabilities not previously enjoyed by most consumers of public data sets.
Participation. The Obama Administration has been conducting bold experiments in interactive government. The Citizen’s Briefing Book, powered by Salesforce.com, has allowed citizens to suggest topics Mr. Obama should consider upon taking office. Once a topic was submitted, other visitors to the Citizen’s Briefing Book could vote the topic up or down and comment on it. Voting, ranking and commenting are hallmark features of web-based, social media applications.
The new Administration has brought forth a new era of honest, open, participatory and transparent government by creatively employing web-based software from innovative companies like Google, Facebook, Salesforce.com and blist. We’re eager to see the use of these technologies extended to WhiteHouse.gov initially and from there we’d love to see more government agencies quickly embrace web technologies to promote communication, transparency and participation.

Sunday, May 10, 2009

My Favorite Songs:
Download Now (Free songs download)
Clicking on the link below will redirect to the rapidshare.com to download the song. dont panic, all songs added in my blogs are absolutely free.
Enrique Iglisias

Roamer-Enrique Iglisias
Say It-Enrique Iglisias
Miss You -Enrique Iglisias
Stay here tonight-Enrique Iglisias

Thursday, April 23, 2009

Bermuda Triangle Mystery


The Bermuda Triangle, also known as the Devil's Triangle, is a region of the northwestern Atlantic Ocean in which a number of aircraft and surface vessels are alleged to have disappeared in mysterious circumstances which fall beyond the boundaries of human error, pirates, equipment failure, or natural disasters. Popular culture has attributed some of these disappearances to the paranormal, a suspension of the laws of physics, or activity by extraterrestrial beings.[1]

A substantial body of documentation exists showing numerous incidents to have been inaccurately reported or embellished by later authors, and numerous official agencies have gone on record as stating that the number and nature of disappearances is similar to any other area of ocean, however proponents of paranormal phenomena claim that many incidents remain unexplained despite considerable investigation.

Wednesday, April 22, 2009

Friends



Whenever we feel alone and dejected we always think about company of a good friend, its the first thing which comes into our mind and the persons who accompany us any time we need them, we should also think about our friends need, how he feels about us and if he is in trouble how can assist him. Think how you can become a good friend after eliminating your habits which all friends dislike.

some days are cold and dark.
Some make us feel so alone.
Some days are hard to understand.
On those days God knew we'd need
an extra hug or two.
So he gave us friends.
So that we would always have
an angel close when we needed one.

Save Power..!!










Entertain these cost saving ideas.

  • Turn off your electronic entertainment devices when you aren’t using them and watch your savings add up.
  • Computers, TVs, VCRs, CD and DVD players and other home electronics use energy even when they are turned off. In the average home, 40 per cent of all electricity used to power home electronics is consumed while the products are turned off. Consider unplugging your electronics or turning off the power bar when you’re finished with them.
  • A plasma T.V. that’s the same size as your older T.V. can use twice the energy. And the bigger your T.V., the more power it uses.
  • Save up to $57 a year by shutting down your computer for 12 hours a day.
  • Screen savers don’t save power; they just protect your screen. Instead, use the sleep-mode or energy-saving feature on your computer and save $18 a year.
  • Save power by turning off your computer monitor when you'll be away from your computer for more than 10 minutes.
  • Consider using a laptop instead of a desktop computer. Laptops use up to 90 per cent less power.
  • The smaller your computer monitor is, the less electricity it will use.
  • Flat-screen LCD computer monitors use about 66 per cent less electricity than standard monitors.
  • Turning a computer on and off doesn't use any extra electricity and won't damage your computer. Shutting it down reduces the wear on your computer and cuts down on your power use.

Every country in the world is going to be the victim of power crisis. But developing countries like India are going to face real problems very soon if we do not conserve power. So here are some basic tips which will help to reduce the power consumption in daily life.

Power saving tips:
Air conditioners
Keep the temperature at 23 degrees which is sufficient normally.
Use coolers instead of air conditioners.
Keep doors to the air conditioned area closed so less power is utilized.

Cell Phones
Use car chargers instead of plugging the charger into a wall socket at home.
Do not keep your phone for charging overnight it can also damage your battery by over charging.
When using the computer, charge your phone using the USB port (if possible).
This uses the power from the PSU-which may otherwise be wasted.

Desktop
Use LCD (TFT) monitors or TVs instead of CRTs whenever possible because CRT consumes more power.
If you aren't keen on playing games, avoid installing a graphics card, especially models with liquid cooling solutions.
Avoid over clocking your processor or graphics card if not necessary.
Set the monitor to automatically shut off or go in standby mode when idle.
Turn the monitor off when your computer is unattended.
Reduce the monitor’s luminosity till the point it is visible.

Laptops
Reduce the luminance of the back light.
Keep the wireless switch turned off if you are not connected to a network.
Charge your laptop batteries only after the battery is fully drained.
Use the balanced mode in power options which will help to utilize the processor only when needed.

General
When alone, use stereo headphones instead of Hi-Fi speakers.
When family members dine or watch TV in the same room, the need for lights and fans elsewhere doesn't arise so ensure that all other lights and fans are switched off.
Instead of keeping the television, music system, printer, scanner, speaker and any other appliance and device, on standby mode, switch them off completely. You can remove the power plug of devices which are not used from the socket and conserve power.
Keep a regular check on your monthly bill to curb power consumption.

So remember the above tips whenever you are dealing with electricity. This can help the country to overcome the power crisis to an extent and also you will be benefited by saving cash paid for your electricity bills.