Sunday, 29 January 2012

How to Create Your Own Customized Run Commands

The Run command on Microsoft Windows operating system allows you to directly open anapplication or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such as Command prompt (cmd), Calculator (calc) etc. So, have you ever wonderedhow to create your...
Read more ...

How to Write-Protect Your USB Flash Drive ??

1. Open the Registry Editor (Open the “Run” dialog box, type regedit and hit “Enter”).2. Navigate to the following Registry key:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\3. Create a New Key named as StorageDevicePolicies. To do this right-click on Control, and click on New->Key and name it as StorageDevicePolicies.4. Now right-click on StorageDevicePolicies and create a New->DWORD (32-bit) Value and name it as...
Read more ...

Friday, 27 January 2012

Buy "2 States: The Story Of My Marriage" Chetan bhagat only Rs.91 Cash On delivery

Order NowCash On deliv...
Read more ...

Thursday, 26 January 2012

Buy Revolution 2020 Chetan Bhagat only Rs.91 !

Order NowCash On deliv...
Read more ...

Get Free Mobile Recharge Through Embeepay in Facebook..

Get ...
Read more ...

Buy 8 GB memory card just Rs. 350/- Free Shipping and cash on Delivery.

Buy Now (Order Now) Key Features of Transcend Memory Card MicroSDHC 8GB Class 48 GB Micro SDHC Memory CardClass 4 Memory CardBuilt-in Error Correcting CodeMechanical Write-protection SwitchDurability: 10000 insertion/removal cyc...
Read more ...

Tuesday, 24 January 2012

How to Protect an Email Account from being Hacked ?

If this is the case, then what is the reason for many people to lose their accounts?The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who lose their email accounts are not the victims of hacking but the victims of Trapping. They lose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves...
Read more ...

What is SSL (Secure Sockets Layer) ?

Secure Sockets Layer (SSL) is the most widely used technology for providing a secure communication between the web client and the web server. Most of us are familiar with many sites such as Gmail, Yahoo etc. using https protocol in their login pages. When we see this, we may wonder what’s the difference between http and https....
Read more ...

How to Protect an Email Account from SPAM ?

What is SPAM?Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam.Where do these SPAM come from?These spam come only from spammers and never from a legitimate user or a company. These spammers send a single email to hundreds (some times thousands...
Read more ...

How to pretect Computer From VIRUSES ?

1. Email is one of the common ways by which your computer can catch a virus. So it is always recommended to stay away from SPAM. Open only those emails that has it’s origin from a trusted source such as those which comes from your contact list. If you are using your own private email host (other than gmail, yahoo, hotmail etc.) then it is highly recommended that you use a good anti-spam software. And finally NEVER...
Read more ...

How to Recover Deleted Files ?

How Does the File Recovery Process Works?When you delete a file from your computer, (or even from the recycle bin) the file is not actually deleted. Unlike what most people think, the file is not permanantly deleted or dropped from your hard disk even if you have deleted them from the recycle bin.Let’s take up a small example of a book containing 50 pages. Suppose when you delete the page 25,...
Read more ...