Spread Firefox Affiliate Button

firefox features n short tricks

Everybody’s favorite open-source browser, Firefox, is great right out of the box. And by adding some of the awesome extensions available out there, the browser just gets better and better.

But look under the hood, and there are a bunch of hidden (and some not-so-secret) tips and tricks available that will crank Firefox up and pimp your browser. Make it faster, cooler, more efficient. Get to be a Jedi master with the following cool Firefox tricks.

1) More screen space. Make your icons small. Go to View - Toolbars - Customize and check the “Use small icons” box.

2) Smart keywords. If there’s a search you use a lot (let’s say IMDB.com’s people search), this is an awesome tool that not many people use. Right-click on the search box, select “Add a Keyword for this search”, give the keyword a name and an easy-to-type and easy-to-remember shortcut name (let’s say “actor”) and save it. Now, when you want to do an actor search, go to Firefox’s address bar, type “actor” and the name of the actor and press return. Instant search! You can do this with any search box.....
Posted on 7/02/2009 08:27:00 PM by m@yur and filed under | 0 Comments »

What are Trojans?

What is a trojan?
A trojan horse could be either:
a) Unauthorized instructions contained within a legitimate program. These instrcutions perform functions unknown to (and probably unwanted by) the user.
b) A Useful program that has been altered by the placement of unauthorized instructions within it.
These instructions perform functions unknown to (and probably unwanted by) the user.
c) Any program that appears to perform a desirable and necessary function but that (because of
unauthorized instructions within it) performs functions unknown to (and probably unwanted by) the user.

Under a restricted environment (a restricted Unix shell or a restricted Windows computer), malicious trojans can't do much, since they are restricted in their actions. But on a home PC, trojans can be lethal and quite destructive.
Posted on 6/18/2009 12:26:00 AM by ket@n and filed under , | 0 Comments »

♫► SAY NO TO PIRACY GET THESE FREE SOFTWARES◄♫

I am sure at some stage we all are guilty of using Pirated Software. There has been so much reported and discussed about this in recent years that it has got me thinking — Do We Really Need Pirated Software?
The conclusion I have come to is NO!
Let us first of all examine briefly what Piracy is all about?
I found this on Autodesk site and it sums up the matter quite excellently in the first 4 points, which are reproduced below:

1. What is software “piracy”?
Software “piracy” is the unauthorized possession and/or use of software. It is a crime no different from shoplifting software from store shelves. Purchasers of software do not actually own the software. What they own is the right to use the software according to the terms of the publisher’s license. Purchasers agree to abide by the terms of the license, which typically limits copying privileges to a single copy for backup purposes.
All legal software is supplied with a license. This applies whether the software is acquired for use on one machine, for networking across a number of machines, or if it is pre-installed as part of a system. The license is designed to protect the rights of software developers and is enforced by copyright laws.
Piracy may take many forms, including:
* unauthorized copying of software programs purchased legitimately, also known as “end-user” piracy. This can occur when the number of PCs installed with the software exceeds the licenses that an individual or company has purchased;
* gaining illegal access to protected software, also knwn as “cracking”; nd
* reproducing and/or distributing counterfeit or unauthorized software, often over the counter, or sold, bartered, or shared by individuals on the Internet; and software programs pre-installed by vendors who sell computers without providing the accompanying software license.

2. What is the difference between criminal and civil software piracy?
The majority of software piracy is....
Posted on 6/14/2009 07:02:00 PM by ket@n and filed under | 0 Comments »

What is a virus?


A VIRUS is a small, executable program with the ability to replicate itself by adding its code to that of a host program or the system area of a hard disk. The user is generally unaware of the actions of a virus as it replicates and usually only becomes aware of its presence when the virus 'activates', which it does according to a given set of conditions.Once the user knows what signs to look for, it can be very obvious when viral activity occurs... Let's discuss the difference between viruses.....

Every virus has its own personality. Viruses differ in many ways, each having its own unique properties that make it different. Here are some ways that viruses differ from each other:
  • SIZE - A virus can be as small as 66 bytes or less, or as large as 4096 bytes or more. Compared to most computer programs a virus must be very small.
  • METHOD OF INFECTION - A virus can infect the host program in different ways. Below are three methods commonly used. They are by no means the only ways, but they are the most common. It is possible for a virus to use one or more of these methods.
  1. OVERWRITING - When a virus infects using this method, it will simply write a copy of itself over the begining of the host program. This is a very simple method and is used by more primitive viruses.  Overwriting tends to make the user suspicious because the host program no longer functions. This method of infection causes no change in the size of an infected program.
  2. APPENDING - This method is a bit more complex. The virus appends itself onto the end of the host program and also edits the begining of the program. When the user runs the infected program ....
Posted on 5/20/2009 11:40:00 PM by ket@n and filed under | 0 Comments »

Speed Up your Broadband Speed

hey everyone,
I just found this article which discusses important tips to significantly speed up your net access through BSNL Dataone Broadband connection & most other connections like Reliance or Tata Indicom or Sify Broadband.
Setting DNS For Your Connection
One of the major problems with BSNL Dataone Broadband connection is the DNS servers they provide by default. Most of the time they are very slow n sometimes they fail to respond. I noticed that I am starting 2 spend a significant amount of time in DNS resolution with dataone connection, often it is larger than the time it takes to actually get the response.

Here is a simple solution to significantly speed up your DNS resolution.
Open up the network connection profile n edit TCP/IP settings. In the DNS server address fields, specify d following
DNS server addresses: 208.67.222.222 and 208.67.220.220

Disconnect the connection n then connect again. YOU ARE DONE!

This specifies 3rd party DNS servers which are significantly faster than BSNL Dataone’s DNS servers.

UPDATE:- These DNS server addresses are the OpenDNS primary and secondary addresses respectively.You'll experience improvement in the speed of "domain name resolving" through this.


m@yur
20.05.2009
Posted on 5/20/2009 07:03:00 PM by m@yur and filed under | 0 Comments »

Backing Up the Registry

Backing up your registry from time to time is a pretty good idea. Well, there's an easy way!
1. Click Start /Run and type in "regedit" (no quotes).
2. Next, click the File menu, Export
3. Select a location from the resulting box and give your backup registry a
name. Something like:
Regbackupfile13.05.2009

Just a quick note: by default, Windows backs up the registry when you shut down your machine. The above is probably best used for those (like myself) who like to tinker with registry settings.

Now, how to restore the registry you just backed up...
First, if Windows gets an error when loading your registry, it will automatically revert to its backup, so it should never give you any kind of trouble loading.

OK, but what do you do if you've been playing around in your registry and have *really* messed stuff up?
Click the Registry menu (in the Registry Editor) and select Import Registry. Then just point the computer to your back up file.

Oh, one more thing. You can also add the registry to your regular backup routine (you do have a backup routine, don't you?). Your registry is in two hidden files called "User.dat" and "System.dat", located in the Windows folder. Just add those two files to your normal backup.

m@yur
13.05.2009
Posted on 5/13/2009 09:56:00 PM by m@yur and filed under | 0 Comments »

Get Windows XP key from Installer CD itself !!!




what do you do if you can’t find the CD with the original key. You can discover the key using the trick below.

Steps :

  1. Insert the Windows XP disk inside your computer.
  2. Explore the CD from my computer.
  3. Open the folder I386...
Posted on 5/01/2009 11:59:00 PM by ket@n and filed under , , | 0 Comments »