வட்டார போக்குவரத்து கழகத்தின் (RTO) ஆன் லைன் சர்வீஸ்


imageநாட்டின் மிக பெரிய லஞ்ச ஊழல் நடமாடும் வட்டார போக்குவரத்து கழகத்தின் (RTO) ஆன் லைன் சர்வீஸ் செயல்ப்படும்.

 

ஒவ்வொரு RTO அலுவுலகத்திலும் இப்பொழுது என்ன நம்பர் சீர்யல் ஓடுகிறது TN - 13 - XX - XXXX , என்ன வி ஐ பி நம்பர் இருக்கிறது, லைசன்ஸ் ஆன்லைன் அப்ளிகேஷன், உங்களின் டிரைவிங் லைசன்ஸ் தற்போதைய நிலமை, ஒவ்வொரு வாகனத்திற்க்கும் ரோடு டாக்ஸ் ஆன்லைனில் செலுத்துதல், கன்டக்டர் உரிமம் புதுபித்தல், புது வாகன் ரிஜிஸ்ட்ரேஷன் அப்ளிகேஷன், ஒட்டுனர் உரிமம் ரோடு டெஸ்ட் ஆன்லைன் அப்பயின்ட்மென்ட், மற்றூம் லோன் ஹைபோதிகேஷன் ஆர் சி புக்கில் இருந்து எடுக்க எந்த ஆர் டி ஓ ஆபிசுக்கு நீங்கள் செல்ல வேண்டும் மற்றூம் வண்டி ரிஜிஸ்ட்ரேஷன் டீட்டேயில்ஸ் எல்லாம் இனிமே நம் கையில், இனிமே புரொக்கர் வேண்டவே வேண்டாம், இந்த சேவை தான் நாம் எதிர்பார்த்த சேவை...........

 

1.ஓட்டுனர் பழகுனர் உரிமம் மனு முன்பதிவு - Learners License Online Application - http://tnsta.gov.in/transport/appointment.do?_tq=890d1045ac27d24cb2b1732731085482

 

2.தொடக்க வாகன பதிவு எண் - Today What Number Series in your RTO - http://tnsta.gov.in/transport/rtoStartNoListAct.do

 

3.வாகன வரி விகிதங்கள் - Tax Rates Details - Vehicle Wise - http://www.tn.gov.in/sta/taxtables.html

 

4.நிர்வாக எல்லை அறிய - Know your RTO by Postcode - http://tnsta.gov.in/transport/know_RtoLoad.do

 

5. ஓட்டுனர் உரிமம் டிரைவிங் லைசன்ஸ் ஆன் லைன் அப்பயின்ட்மென்ட் - Online Appointment Booking for Road Test - http://tnsta.gov.in/transport/appointment.do?_tq=51da2bc262553b8d4f4adb3a40eb2af1

 

6.பொது நிர்வாக விசாரிப்புகள் - General Enquiries - http://tnsta.gov.in/transport/contacts.do

How to Protect Your Email Id and Facebook from Hackers


 

Everybody use email accounts and social networking websites such as orkut, twitter and facebook. There are many important information of a person in these email accounts and social networking website. so it is important to protect these account from hackers. Because hackers always try to get others account to get those secret and personal data for bad purpose. If use your email id for business and other services then it's a great loss and trouble for you. So always try to be safe from hackers

 

Follow these simple steps i am writing below to protect yourself from being hacked.

Never share your password to anyone.

Don't use password as your nick name, phone no. or pet names..

Use the combination of lower case, upper case, numbers and special characters for passwords.

Never click on any suspected link comes in a mail from unknown sender.

Never give your passwords to any 3rd party websites for any service.

Use different passwords for different accounts.

Check the website url every time before login.

Use secondary email address and mobile phone numbers with secret questions for account recovery.

Never use any javascript code in url while login to any of your email or any other website account. It may be a cookie stealer script.

Use latest antivirus and antimalware softwares with firewall on.


These are some steps which you can follow for safe surfing over the internet.
Don't give any chance to hackers...

Ethernet Cable - Color Coding Diagram


The information listed here is to assist Network Administrators in the color coding of Ethernet cables. Please be aware that modifying Ethernet cables improperly may cause loss of network connectivity. Use this information at your own risk, and insure all connectors and cables are modified in accordance with standards. The Internet Centre and its affiliates cannot be held liable for the use of this information in whole or in part.
T-568A Straight-Through Ethernet Cable
The TIA/EIA 568-A standard which was ratified in 1995, was replaced by the TIA/EIA 568-B standard in 2002 and has been updated since. Both standards define the T-568A and T-568B pin-outs for using Unshielded Twisted Pair cable and RJ-45 connectors for Ethernet connectivity. The standards and pin-out specification appear to be related and interchangeable, but are not the same and should not be used interchangeably.
T-568B Straight-Through Ethernet Cable
Both the T-568A and the T-568B standard Straight-Through cables are used most often as patch cords for your Ethernet connections. If you require a cable to connect two Ethernet devices directly together without a hub or when you connect two hubs together, you will need to use a Crossover cable instead.
RJ-45 Crossover Ethernet Cable
A good way of remembering how to wire a Crossover Ethernet cable is to wire one end using the T-568A standard and the other end using the T-568B standard. Another way of remembering the color coding is to simply switch the Green set of wires in place with the Orange set of wires. Specifically, switch the solid Green (G) with the solid Orange, and switch the green/white with the orange/white.
Ethernet Cable Instructions:
  1. Pull the cable off the reel to the desired length and cut. If you are pulling cables through holes, its easier to attach the RJ-45 plugs after the cable is pulled. The total length of wire segments between a PC and a hub or between two PC's cannot exceed 100 Meters (328 feet) for 100BASE-TX and 300 Meters for 10BASE-T.
  2. Start on one end and strip the cable jacket off (about 1") using a stripper or a knife. Be extra careful not to nick the wires, otherwise you will need to start over.
  3. Spread, untwist the pairs, and arrange the wires in the order of the desired cable end. Flatten the end between your thumb and forefinger. Trim the ends of the wires so they are even with one another, leaving only 1/2" in wire length. If it is longer than 1/2" it will be out-of-spec and susceptible to crosstalk. Flatten and insure there are no spaces between wires.
  4. Hold the RJ-45 plug with the clip facing down or away from you. Push the wires firmly into the plug. Inspect each wire is flat even at the front of the plug. Check the order of the wires. Double check again. Check that the jacket is fitted right against the stop of the plug. Carefully hold the wire and firmly crimp the RJ-45 with the crimper.
  5. Check the color orientation, check that the crimped connection is not about to come apart, and check to see if the wires are flat against the front of the plug. If even one of these are incorrect, you will have to start over. Test the Ethernet cable.
Ethernet Cable Tips:
  • A straight-thru cable has identical ends.
  • A crossover cable has different ends.
  • A straight-thru is used as a patch cord in Ethernet connections.
  • A crossover is used to connect two Ethernet devices without a hub or for connecting two hubs.
  • A crossover has one end with the Orange set of wires switched with the Green set.
  • Odd numbered pins are always striped, even numbered pins are always solid colored.
  • Looking at the RJ-45 with the clip facing away from you, Brown is always on the right, and pin 1 is on the left.
  • No more than 1/2" of the Ethernet cable should be untwisted otherwise it will be susceptible to crosstalk.
  • Do not deform, do not bend, do not stretch, do not staple, do not run parallel with power cables, and do not run Ethernet cables near noise inducing components.
Basic Theory:

By looking at a T-568A UTP Ethernet straight-thru cable and an Ethernet crossover cable with a T-568B end, we see that the TX (transmitter) pins are connected to the corresponding RX (receiver) pins, plus to plus and minus to minus. You can also see that both the blue and brown wire pairs on pins 4, 5, 7, and 8 are not used in either standard. What you may not realize is that, these same pins 4, 5, 7, and 8 are not used or required in 100BASE-TX as well. So why bother using these wires, well for one thing its simply easier to make a connection with all the wires grouped together. Otherwise you'll be spending time trying to fit those tiny little wires into each of the corresponding holes in the RJ-45 connector.

How to Speed up your Computer


Perform a disk clean up.
Remove unwanted/unneeded software which may be the reason for slowdown
Defragment Your Computer
Stop unwanted Start-Up programs
    sfsadfsadf

    How To Connect Two Monitors in One Computer


    In many professions, including graphic design, architecture, communications, accounting, engineering and video editing, the idea of two or more monitors being driven from one machine is not a new one. While in the past, it has meant multiple graphics adapters and specialized software, it was common for engineers to have at least two, if not more, displays to enhance productivity.

    Now that multiple-monitor setups are more budget-friendly, it is not uncommon to see a wide range of business professionals using multiple monitors to increase visual area. This advantage helps promote the concept of a paperless office by increasing the quantity of simultaneous media that can be viewed digitally, although the advantage of viewing two documents simultaneously is also feasible on many larger widescreen monitors.


    How to Earn from the internet?


    Where's George?There are several ways to earn from the internet. But you have to remember that there is no special trick or quick rich set up to do this. If anyone says that they have a product that will let you earn while just sitting around after buying their program, then most likely its a scam. To earn from the internet takes effort and time as well as knowledge on how use the internet for your advantage.

    Some ways to earn from the internet are the following:

    Blogging - this would be making post from time to time. You can place ads in your blog and earn from them.

    Paid to click - there are several sites that pays you when you click some ads. Though they do not pay that high, but this is the easiest way since all you have to do is click.

    Affiliate Marketing - certain sites will accept you as a member to become an affiliate marketer. You don't need to have a product of your own to sell. You simply sell the products of others and earn commission for every sale.

    Article Writing - several sites pays you to write articles. You simply submit to the site articles that you write basing on different categories and once accepted they will pay you depending on how good your article is.

    There are still a lot of ways to earn from the internet. Basically, what is needed is your time and effort. Just like any work, you need to devote time and effort to be successful.

    9 TIPS to keep your computer healthy and safe


    By following this 9 tips you can make your computer healthy and safe always.
    Fix any computer problem with a solid set of workbench tools
    1. Run Windows Update for Windows XP and 2000. Make sure Internet Explorer and other browsers are updated to the latest versions.

    2. Connect your computer to a hardware firewall, or run a free firewall program such as Zone alarm. This will ensure that hackers do not intrude your computer using newly discovered Windows vulnerabilities. If you use a hardware based firewall, make sure that only ports of services you need are enabled (such as web browsing - HTTP is port 80). Many of the firewalls for home use allow all ports to be open by default - you turn off services by entering ranges of ports to be blocked. (See the instruction manual of your firewall).

    3. Install adware detection programs, such as Adware or SPYBOT: Search and Destroy, which are free for download. Run these at least every other day if you are an active web surfer, constantly doing research or shopping online.

    4. Run anti-virus software and make sure virus definitions are set to automatically update or you should check for updates, manually. If your anti-virus subscription has run out, uninstall it, and install AVG Anti-Virus by www.Grisoft.com for a free personal edition (Do not run this on your work computer without paying for it!).

    5. If you have an older computer, investigate any suspicious "whirring" noises. A hard drive that is making a very loud "whirring" noise may be aging and damaged by heat - consider replacing it soon. Also, make sure that all fans are running properly, inside, and that there are no large collections of dust on the motherboard, PCI cards, or the fans. If so, be very careful in removing it. All power should be turned off, including removal of the power cord, as some motherboards maintain a small charge from the power supply even after the computer is actually turned off.

    6. Run the Windows XP / 2000 disk defragmenter once per month. This allows for data files to be stored with each segment next to each other in order, on the disk. Without defragmenting, Windows will store data where ever it finds space, but many times it will store pieces of a data file in many different areas on a hard drive. This is how it was designed. It is faster for Windows to store data in just anyplace it can, without having to think about storing everything close together - that apparently would be too much logic to be used at one time and slow down the immediate saving of files (this is *only* my guess).

    7. Make sure programs and drivers are updated. If everything seems to be working, check for driver updates once per year.

    8. This is not necessarily related to your computer's health, but before if it ever does get sick, it is good to make sure that you are getting regular backups. Try backing up your My Documents folders and files to a CD every month and carefully label and store it away. If it seems to be too much hassle to burn a CD, try getting a USB memory device and backup your files to this once in awhile, though these are not as reliable as a CD backup (they are prone to problems with static electricity and breakage), they are better than no backup at all.

    9. Use a UPS (Uninterruptable Power Supply) to ensure that your computer gets good voltage and is not turned off when the power hiccups. Also, make sure you do not turn off your computer abruptly - always go through the Start button and shutdown or control-alt-delete, click shutdown sequence to ensure that your computer is shut down as graceful as possible.

    Five tips to help keep your passwords secret


    Treat your passwords with as much care as you treat the information that they protect. Use strong passwords to log on to your computer and to any site, including social networking sites. where you enter your credit card number, or any financial or personal information.

     

      1. Never provide your password in an email or in response to an email request.
             * Internet "phishing" scams use fraudulent email messages to entice you to reveal your user names and passwords, steal your identity, and more. Learn more about phishing scams and how to deal with online fraud.


      2. Do not type passwords on computers that you do not control, such as those in Internet cafes, computer labs, kiosk systems, and airport lounges.
             * Cyber criminals can purchase keystroke logging devices that gather information typed on public computers, including passwords.
             * If you need to regularly check email from a public computer, consider using Hotmail, which allows you to obtain a single-use code. To get a single-use code, click Sign in with a single-use code, and Hotmail will send a one-time use authentication code to a mobile phone. You can opt to use the one-time code, instead of your password, to access your account on a public machine.


      3. Don't reveal your passwords to others.
             * Keep your passwords hidden from friends or family members (especially children), who could pass them on to other, less trustworthy individuals.


      4. Protect any recorded passwords.
             * Don't store passwords on a file in your computer, because criminals will look there first.
             * Keep your record of the passwords you use in a safe, secure place.


      5. Use more than one password.
             * Use different passwords for different websites and services.

    Protect your e-mail with a password


    You can access e-mail from multiple e-mail accounts, but Windows Live Mail isn't meant to be used by multiple users on a single Microsoft Windows account. Signing out of Windows Live Mail doesn't prevent other people from accessing your e-mail on the current Microsoft Windows account. Anyone who opens Windows Live Mail in a particular Windows account can see all of the e-mail accounts that have been added to Windows Live Mail, not just their own e-mail account, without entering a password.

     

    You can't create Microsoft Outlook Express e-mail identities (A method used in Outlook Express that allows multiple people sharing the same computer to keep their e-mail separate. Identities aren't used in Windows Live Mail.) in Windows Live Mail. Instead, to protect each user's e-mail with a password, create a separate Windows user account and password for each person who wants to use Windows Live Mail on the computer. Each user will then be able to log on only to their own Windows account and access only their own Windows Live Mail e-mail accounts.

     

    For more instructions about how to create a new Windows account and password for each user on your computer:

        * If you use Windows XP, click Start, click Help and Support, and then search for Create a new user account.
        * If you use Windows Vista, go to the Windows Vista Help website, and then search for Create a new user account.

    How to solve the Blue screen error (dump error) in Windows Operating System


    That happens because of the error in the hard disk due to improper power shutdown.

     

    image

     

    Fix the errors by using the disk check tool that is already available in Windows XP.

     

    If the above said does not solve then the only solution is to format the system and re-install the Operating System.

    Reset ML-2240 and ML-1640 : Simple package download


    image

    I will give you the download link and how to do this. The Simple package contains only the patched version of firmware so you only need to do the final step as I did.

     

    But before you begin, Please read the facts carefully:


    The firmware file included in the simple package are the patched version.


    I’ve run the patches for a Samsung ML-1640 and it works fine till now, but I never test the fix for ML-2240, however I also supply the file because it’s provided by the same patches.


    My operating system is Windows XP SP2. image

     

    • How to do with the Simple Package?

       

    • You only need to run the firmware down-loader (downlXX40.bat), DO NOT turn off or disconnect the printer/computer during this process. That should be it, now press any key to exit the downloads, turn off your printer for about 10 seconds and turn it back on.

    •  

    • Simple Package for ML-1640

    • You will find 3 files in this package:

      FIX_ML1640_V1010083.fls is the patched firmware

      • downl1640.bat is the firmware downloads (to printer)
      • usbprns2.exe is the tools run by the downloads

      Click here to download Simple Package for ML-1640

    •  

    • Simple Package for ML-2240

    •  

    • You will find 3 files in this package:

      • FIX_ML2240_V1010083.fls is the patched firmware
      • downl2240.bat is the firmware downloads (to printer)
      • usbprns2.exe is the tools run by the downloads

      Click here to download Simple Package for ML-2240

      Do Drop your comments and don’t forgot to subscribe our blog below.

    Reset ML-1640 and ML-2240 : Raw Package download


    image

    I will give you the download link and how to do this. The Raw Package contains the original firmware upgrades from Samsung with the patches and firmware downloads. With this package you’ll need to run the complete steps as I did.

     

    But before you begin, Please read the facts carefully:


    The firmware upgrades included in the raw package are official version downloaded from SAMSUNG website.


    I’ve run the patches for a Samsung ML-1640 and it works fine till now, but I never test the fix for ML-2240, however I also supply the file because it’s provided by the same patches.


    My operating system is Windows XP SP2.

     

    How to do with the Raw Package?

    Please follow these steps if you use the Raw Package:


    Extract the package, by default it will go to a new folder with the same name as the package

    Run the official firmware upgrades (ML-XX40 _V1.01.00.83.exe)


    Choose which connection is used for the printer (USB/Network), this printer model is only available with USB connection.

    image
    See the temporary folder used for the firmware on 2nd panel “Select Downloaded Firmware” in File Name field. Open the specified folder and copy the specified file name (with fls extension) to the package folder.


    Now close the firmware upgrades.

    Run the firmware patches (fixXX40.bat) and you will find new firmware file in the same folder with prefix “FIX_”, press any key to exit the patches.

    Make sure your printer is turned on and is properly connected to your computer.


    Run the firmware down-loader (downlXX40.bat), DO NOT turn off or disconnect the printer/computer during this process.

    That should be it, now press any key to exit the down-loader, turn off your printer for about 10 seconds and turn it back on.

    • Raw Package for ML-1640

    •  

    • You will find 5 files in this package:

    • ML-1640_V1.01.00.83.exe is the official firmware upgrade

      downl1640.bat is the firmware downloads (to printer)
      fix1640.bat is the firmware patches
      fixml40.exe is the tools run by the patches
      usbprns2.exe is the tools run by the downloads

    • Click here to download Raw Package for ML-1640

    •  

    • Raw Package for ML-2240

    •  

    • You will find 5 files in this package:

    • ML-2240_V1.01.00.83.exe is the official firmware upgrade

      downl2240.bat is the firmware downloads (to printer)

      fix2240.bat is the firmware patches

      fixml40.exe is the tools run by the patches

      usbprns2.exe is the tools run by the downloads 

    நானா இ-மெயில் அனுப்பினேன்?


    image திடீரென உங்கள் நண்பர்கள் போன் செய்து, உங்கள் கம்ப்யூட்டரிலிருந்து, தேவையற்ற மெயில்கள் வந்துள்ளதாகவும், அது போல அனுப்ப வேண்டாம் என்றும் சொல்வார்கள். விபரம் தெரிந்த நபர்கள், உங்கள் இமெயில் அக்கவுண்ட்டிலிருந்து, நீங்கள் அனுப்பாமலேயே சில மெயில்கள் வருவதாகக் குற்றம் சாட்டுவார்கள். கனிவுள்ளவர்களோ, இது போல வருகின்றன; உன் கம்ப்யூட்டரை வைரஸ் மற்றும் ஸ்பேம் மெயில், மால்வேர் புரோகிராம் செக் செய்திடச் சொல்வார்கள்.


    இது போன்ற சூழ்நிலையில் என்ன நடக்கிறது? என்று நீங்கள் விழிப்பீர்கள். ஏனென்றால், நண்பர்கள் குறிப்பிடும் அந்த மெயில் எல்லாம், உறுதியாக நீங்கள் அனுப்பவில்லை என்று தெரியும். ஏன் அது உங்கள் கம்ப்யூட்டரால் கூட அனுப்பப்பட்டிருக்காது. உங்கள் நண்பர்கள் வட்டத்தில் ஒருவரின் கம்ப்யூட்டர் ஸ்பேம் மெயில் அல்லது வைரஸ் அல்லது மால்வேர் புரோகிராமினால் பாதிக்கப்பட்டு, அது உங்கள் இமெயில் அக்கவுண்ட் மூலமாக இந்த ஸ்பேம் மெயில்களை, அட்ரஸ் புக்கில் உள்ள அனைவருக்கு இதனை அனுப்பி இருக்கலாம். அல்லது நீங்கள் அறியாத ஒரு நபர், உங்கள் இமெயில் அக்கவுண்ட்டினையே ஹைஜாக் செய்திருக்கலாம்.

     

    இதற்கான தீர்வு என்ன? image

    முதலில் உங்கள் இமெயில் அக்கவுண்ட்டினை நீங்கள் அணுகித் திறந்து பார்க்க முடிகிறது என்றால், அதன் பாஸ்வேர்டை உடனே இன்னும் கடுமையான பாஸ்வேர்டாக மாற்றவும். உங்களால் உங்கள் இமெயில் அக்கவுண்ட்டினை, வழக்கமான பாஸ்வேர்ட் பயன்படுத்தித் திறக்க முடியவில்லை என்றால், உங்கள் இமெயில் அக்கவுண்ட் ஹைஜாக் செய்யப்பட்டுள்ளது என்று பொருள். யாரோ ஒருவர், உங்கள் அக்கவுண்ட்டின் பாஸ்வேர்டைக் கண்டுபிடித்து, பாஸ்வேர்டினை மாற்றி, இது போல ஸ்பேம் மெயில்களுக்கெனப் பயன்படுத்திக் கொண்டுள்ளார். ஒரு சிலர், இது போல இமெயில் ஹைஜாக் செய்த பின்னர், அதன் இமெயிலுக்கு உரியவர் பெயரில், அவரின் உற்ற நண்பருக்கு, தான் டில்லி வந்து மாட்டிக் கொண்டதாகவும், பணம் தேவை எனக்கூறி ஏதேனும் ஒரு அக்கவுண்ட் எண்ணுக்கு பணம் அனுப்ப வேண்டிக் கொள்வார். இதில் அனைத்துமே ஏமாற்று வேலையாக இருக்கும். இது போல இமெயில்கள் ஹைஜாக் செய்யப்படுகையில், உடனே உங்களுக்கு இமெயில் சேவையினை வழங்குபவரைத் தொடர்பு கொண்டு, உடனடியாக உங்கள் அக்கவுண்ட்டினை மீட்டுத் தருமாறு கேட்டுக் கொள்ளவும்.


    இலவசமாக இமெயில் தரும் பிரபல நிறுவனங்கள் எனில், அவர்கள் தளத்தில் இதற்கான வழி தரப்பட்டிருக்கும். சில பிரபல இமெயில் அக்கவுண்ட்டில் இது போல ஏற்பட்டால் நீங்கள் தொடர்பு கொள்ள வேண்டிய தள முகவரிகள் கீழே தரப்பட்டுள்ளன.

    image
    ஜி மெயில்: Click here for Google Mail

    யாஹூ: Click here for Yahoo Mail

    ஹாட்மெயில்: Click here for Hot Mail


    ஆனால், பாஸ்வேர்ட் கொடுத்து அக்கவுண்ட்டில் நுழைய முடியும் என்றால், அந்த அக்கவுண்ட் ஹைஜாக் செய்யப்படவில்லை; ஆனால் உங்களுடைய பாஸ்வேர்டினைப் பயன்படுத்தி யாரோ விளையாடுகிறார்கள் என்று பொருள். உடனே மேலே குறிப்பிட்டபடி, பாஸ்வேர்டினை மாற்றவும்.

    Windows OS Startup issues & solution


    All most all of the people are currently using Windows XP Operating system itself. Being a users it is better to know about the configuration settings of the OS.

     

    Ample knowledge on Regedit & MS-Config is a bit essential for everybody.


    1.  After successful installation of many programs like yahoo messenger, Google talk, Skype , Nero, real one player and many more , default they comes to startup which takes a lot of memory (RAM usage) which results in the decrease of system performance also. In order to solve such issues one must use MS-CONFIG

    msconfig
    Steps:
    START--> RUN --> MS-CONFIG --> STARTUP tab --> Remove the check box of the concerned application and "apply". Better to restart the system after applying the modification.


    This disables the applications in startup which helps in saving memory.


    2.  Most of the software applications like Oracle, Hyperion, Visual studio are registered with the system files. So uninstalling the application is not completely removing from the system as they are registered with system files. So better remove it from windows registry.

    Run folder
    Steps :
    START-->RUN-->  REGEDIT--> Search for the required software component and delete it from right side of the panel. Be careful before deleting as they are all sensitive components of the system.
    We can enable & disable the usage of USB and other ports using this regedit. we can manage the whole operating system using this regedit.


    3.  Better to use windows XP rather than Vista as it requires more memory (RAM) . For the people who are interested in Vista Environment there are some themes available in the internet where the environment appears as VISTA in the XP itself. But it also use more memory (RAM) but not as vista.

    5 Tips to Recover Data from a Crashed Computer


    The hard drive has the shortest life expectancy of all components, but when it inevitably fails it’s always when you least expect it.Crashed Computer


    It’s an inevitability, and it always happens when you’re least prepared – the hard drive crash. Sure, you might notice it’s taking a bit longer to boot, or there’s an occasional click that just doesn’t sound right, but it’s still a surprise the day your computer fails to boot.


    How do you get your data off that hard drive once it’s no longer able to boot? Is it still possible? This depends on what exactly went wrong with your drive. It is safe to assume, however, that will the proper method, you will be able to retrieve at least part of your lost data.


    Below are five different methods for getting documents, pictures, and other important files off a crashed hard drive.


    1. Use an External Case
    This method is the most simple available, and for many people it is also the solution they need. Simply purchase an external hard drive case that allows you to plug your hard drive into a computer with a standard USB cable. Remove the crashed hard drive from your computer and carefully insert it into the external case (make sure you ground yourself before touching it), then plug it into a different system and try to open the drive. There’s a good chance you’ll be able to navigate into your documents and other folders and copy them onto a different hard drive.


    2. Use a LiveCD
    Don’t have access to a second computer for doing as you please? This method will be ideal, then. You’ll need to get temporary access to a computer with Internet and a DVD burner. Download a Linux LiveCD – Damn Small Linux is the smallest, but also has issues mounting hard drives. The most simple for an average computer user would be Puppy Linux. It has a larger file size, but should recognize your drive.


    Burn the Live CD ISO to a CD and insert it into your computer (the one with the crashed hard drive). Restart the computer and when it the computer logo appears, press F2 (or whatever key for your system) to enter BIOS. Change the boot sequence to CD first, Save and then Exit.


    The Live CD will start, simply follow the directions on the screen–don’t worry, nothing is being done to your hard drive. The OS will start, and you should see your hard drive mounted on the desktop–something like “60GB”, etc. Plug in a second drive and copy and paste the folders over.


    3. Data Recovery Software
    Do the above solutions have your head spinning? If you want something a little less complicated, you may want to give recovery software a go. There are a number of different free recovery tools available, and you may be one of the lucky users who have success with the programs.


    There are a large number of programs available, but the quality of each varies. A good place to start would be Data Disc Recovery–it’s free, easy to use, and works on crashed drives (it can also retrieve deleted files and others). If one doesn’t work, try a different one.


    4. Freeze It
    This method surprises many, but it actually does work (depending on what happened to the drive). The idea is that freezing it will constrict loose parts long enough for the drive to work properly. Make sure you have a computer ready to plug the drive into and an external case. Place the hard drive into a baggy, seal it tightly, and put it in the freezer overnight. The next day, remove it from the baggy and put it in the external drive case. Transfer the data from the drive before it warms too much and crashes again.


    5. Get a Pro
    If all else fails, you either have to accept that the data is gone or, if the data is really important, take the hard drive to a professional. It will be expensive, but there’s a good chance a pro will be able to retrieve some of the data for you.

    Simple tutorial to Secure your LAN


    2010-05-16: Protectin' Ur IntertubezIn this short tutorial where you will come to know the basics of LAN security. As far as LAN security is concerned firewalls, anti-viruses play an important role in it.Viruses can affect your pc or your entire network. Hence it is very important to ensure that your connection is secure.

    Security of LAN is sub-divided in two parts.
    * Manual security
    * Tools security.

    As far as manual security is concerned, it takes into consideration pen drive, CD, DVD,etc. Ensure that these stuffs you are going to insert are pre scanned and does not contain any viruses. This can harm your entire network. Secondly do not allow any of your friend to take an access of your server, or do not revel any passwords that you have set for firewalls and your TCP ports. This could take away your entire privacy. With tools security play a most important part in LAN security.

    Tools like Port Monitors & Trojan Cleaners should be given a big existence in LAN security.Port monitors are programs that you install on your computer. They are simpler than the Personal Firewalls in that their main purpose is to detect incoming port scans on your computers. Some also shut down an unauthorized scan, but for that capability you usually need to use a firewall. Trojan cleaners look for Back Orifice and Net Bus.
    IMGP9552.JPG

    Two common and most important tools
    * Nukenabber
    * The Cleaner
    are specially meant to have a look on the TCP and UDP ports. This look after the attack on the system over internet.A total of 50 ports can be looked after at the same time.

    Windows 7 Wallpapers Gallery - IV


    Windows 7 Wallpapers Gallery - IV, Click the image to Enlarge

    wind-7 (15) wind-7 (16) wind-7 (17) zzz Win7 (10) Win7 (11) Win7 (12) Win7 (13) Win7 (14) Win7 (15) Win7 (16) Win7 (17) Win7 (18) Win7 (19) Win7 (20) Win7 (21) Win7 (22) Win7 (23) Win7 (24) Win7 (25) Win7 (26) Win7 (27) Win7 (28) Win7 (29) Win7 (30) Win7 (31) wind-7 (1) wind-7 (2) wind-7 (3) wind-7 (4) wind-7 (5) wind-7 (6) wind-7 (7) wind-7 (8) Wheat Fied, Palouse, Washington State, USA wind-7 (10) wind-7 (11) wind-7 (12) wind-7 (13) wind-7 (14)

    download_button