BidVertiser

Get your own Domain for free

Wednesday, December 22, 2010 Posted by Sangram 0 comments
How to Get Your Own Domain for free !!

Hi
Readers,

I have been searching about various techniques,sites which offer free domain & web hosting.
Its easy to have free personal website. Believe me. :-)

You can spend some bucks registering domain name, and a few more to have a company host your website, or you can get it all for free. Here's how you can do that.

Getting your own domain name

The first step in our little project is obtaining a domain name. But with zero budget, you shouldn’t expect to be able to snatch a dot com – or any other popular dots like org, net, name or tv. For this experimental purposes, we’ll go with a less popular but free alternative.

The free service that I always use for quick and free domain names is www.co.cc. This service will provide you with 2 free domain names (with .co.cc suffixes) for personal use. (But that doesn’t mean that you can’t register for more with different email addresses. Wink!)

Visit the site and search for the availability of your chosen domain name(s). I’ve registeredbuildablog.co.cc for this article so you can’t claim that one.

how to set up blog site

If your chosen name is available, please check whether it’s available for free because there are names which are not free. Then continue with the registration.

If you’ve been here before, you can log in with your account. Newcomers click “Create an account now“.

After completing the registration process, you need to set up your domain. This step should be done within 48 hours or they will delete the domain. So click the set up button now.

This is how you Get your free Domain with CO.CC
Thanks.



How to Get Personal Loan !!

Posted by Sangram 0 comments
Rate Of Interest for Personal Loan

Hi All ,

From last few days , i was thinking of posting something about the Housing Loan or Personal loan. Finally Today i did some analysis about Personal Loan , Specially about the Indian Market.
So, I would like to share The information with you guys.

Most of us needs Personal Loan in life , It could be for anything, to fulfill your dreams .

What is Personal Loan ?

Personal Loan is an unsecured loan for personal use which doesn’t require any security or collateral and can be availed for any purpose, be it a wedding expenditure, a holiday or purchasing consumer durables, the personal loan is very handy & caters to all your needs. The amount of loan can be ranged from Rs. 50,000 – Rs. 20 lakh & the tenure for repaying the loan varies from 1 to 5 years.


Personal Loan : Rate Of Interest:

( On : 21 December 2010 )

CitiBank--------------------------------16.5%-18.5%

HDFC-------------------------------------15.5%-22%

Fullerton----------------------------------19%-28%

CityFinancial -----------------------------16%-21%

SBI-----------------------------------------16%-20%

Standard Chartered--------------------15.5%-22%

There are thousands of Co-Operative Banks other than these popular banks ,which also have good offers for personal Loans offered in various categories.


In My next blog , i will add more details about Personal loan and the Process.

Regards.

The Best Web-Apps for Gmail

Saturday, December 18, 2010 Posted by Sangram 0 comments
Google Apps offers simple, powerful communication and collaboration tools for any size business – all hosted by Google to streamline setup, minimize maintenance, and reduce IT costs.


Let’s now look at some useful web apps that will help improve your Gmail experience. They should also work with your Google Apps for Gmail accounts.

1. Other Inbox
This is perhaps the easiest way to cleanup your GMail Inbox.

Other Inbox scan your mailbox for unimportant emails and automatically sorts them into relevant folders. For instance, news alerts from CNN would go into the News folder while emails from Amazon or iTunes will be labeled as Shopping.

2. Unsubscribe.me
This adds a little “unsubscribe” button to your Gmail Inbox allowing you to unsubscribe from mailing lists and unwanted newsletters with the click of a button.

It won’t move any future messages from that sender to the trash, it just gets the sender to stop sending you any more emails.

3. FindBigmail.com
When you are running out of space on Gmail, use this service to find the largest emails in your account and delete /download them to recover some space.

FindBigMail connects to Gmail via IMAP and retrieves only the sizes and not the full content of the email messages. It uses a temporary token and therefore won’t have access to your Gmail account forever.

4. Rapportive.com –
If you get an email from an unfamiliar person, you don’t have to use Google to know more about him or her as Rapportive will bring all that information right inside your Gmail inbox.

Rapportive takes the email address of the sender and builds a profile based on all the other social networks – like LinkedIn, Facebook, Twitter, etc. – where that person may have a presence.

5. AwayFind.com –
You are on a vacation but still have to check emails just because you don’t want to miss any of the “urgent” messages from your important clients?

With AwayFind, you can easily create alerts for important emails and get notified via phone calls or text messages without having to constantly check your mailbox.

6. Email Oracle –
This adds tracking to your outgoing Gmail messages so you’ll know if a particular message has been read by the recipient or not.

It does this by adding a tracking image to your messages and therefore the read receipts will only arrive if the recipient has allowed downloading of web images in her email client.

7. eTacts.com –
This is much like the previously mentioned Rapportive service but with some additional features.

First, you get a list of all your recent interactions with a person as soon as you open his or her message. Second, you can set how frequently you would like to stay in touch with a person and, if you don’t exchange emails for long, eTacts will send you an automatic reminder.

8. Hotmail.com –
How do you access your older emails when the main Gmail service is down and you don’t have an offline backup?

It is therefore recommended that you use a non-Gmail service to backup your Gmail messages and Hotmail perfectly fits the bill here. This archive should also come handy incase your Gmail gets hacked.

9. TripIt –
The service will scan your email inbox multiple times a day for any travel plans and automatically imports them to your TripIt itineraries without you having to forward any email message to TripIt.

If you already have an existing trip with overlapping dates, TripIt will add the plan to your trip else it will create a new trip.

10. Boomerang –
With Boomerang for Gmail, you can compose an email now and schedule it to be sent a later time. Thus you can easily schedule birthday notes when you have time to write them and have Boomerang dispatch them at the right time.

Regards,

Packet Sniffers

Thursday, July 1, 2010 Posted by Sangram 0 comments

Packet Sniffers :-

Ethereal :- This (also known as Wireshark) is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types.

Home:- http://www.wireshark.org
Latest Release:- Wireshark 1.0.4 (Ethereal)
Download:- http://www.wireshark.org/download.html



Kismet :- A powerful wireless
sniffer. Kismet is a console based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing, and can even decloak hidden networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps.

Home:- http://www.kismetwireless.net
Latest Release:- Kismet-2008-05-R1
Download:- http://www.kismetwireless.net/download.shtml



Tcpdump :- The classic sniffer for network monitoring and data acquisition. It is great for tracking down network problems or monitoring activity. There is a separate Windows port named WinDump. TCPDump is the source of the Libpcap/WinPcap packet capture library.

Home:- http://www.tcpdump.org
Latest Release:- TCPDUMP 4.0.0
Download:- http://www.tcpdump.org/



Ettercap :- Ettercap is a terminal-based network sniffer/interceptor/logger for ethernet LANs. It supports active and passive dissection of many protocols (even ciphered ones, like ssh and https). Data injection in an established connection and filtering on the fly is also possible, keeping the connection synchronized. Many sniffing modes were implemented to give you a powerful and complete sniffing suite. Plugins are supported. It has the ability to check whether you are in a switched LAN or not, and to use OS fingerprints (active or passive) to let you know the geometry of the LAN.

Home:- http://ettercap.sourceforge.net
Latest Release:- Ettercap NG-0.7.3
Download:- http://sourceforge.net/projects/ettercap/



DSniff :- A suite of powerful network auditing and penetration-testing tools. This popular and well-engineered suite by Dug Song includes many tools. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected ssh and https sessions by exploiting weak bindings in ad-hoc PKI. Overall, this is a great toolset. It handles pretty much all of your password sniffing needs.

Home:- http://www.monkey.org
Latest Release:- dsniff-2.3
Download:- http://www.monkey.org/~dugsong/dsniff



Happy Hacking !!!!!

Wireless hacking

Posted by Sangram 0 comments

Wireless hacking

Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.
The step by step procerdure in wireless hacking can be explained with help of different topics as follows:-

1)
Stations and Access Points :- A wireless network interface card (adapter) is a device, called a station, providing the network physical layer over a radio link to another station.
An access point (AP) is a station that provides frame distribution service to stations associated with it.
The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 32 byte long Service Set Identifier (SSID) that is also commonly called a network name. The SSID is used to segment the airwaves for usage.

2)
Channels :- The stations communicate with each other using radio frequencies between 2.4 GHz and 2.5 GHz. Neighboring channels are only 5 MHz apart. Two wireless networks using neighboring channels may interfere with each other.

3)
Wired Equivalent Privacy (WEP) :- It is a shared-secret key encryption system used to encrypt packets transmitted between a station and an AP. The WEP algorithm is intended to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network. WEP encrypts the payload of data packets. Management and control frames are always transmitted in the clear. WEP uses the RC4 encryption algorithm.

4)
Wireless Network Sniffing :- Sniffing is eavesdropping on the network. A (packet) sniffer is a program that intercepts and decodes network traffic broadcast through a medium. It is easier to sniff wireless networks than wired ones. Sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections.

5 )
Passive Scanning :- Scanning is the act of sniffing by tuning to various radio channels of the devices. A passive network scanner instructs the wireless card to listen to each channel for a few messages. This does not reveal the presence of the scanner. An attacker can passively scan without transmitting at all.

6)
Detection of SSID :- The attacker can discover the SSID of a network usually by passive scanning because the SSID occurs in the following frame types: Beacon, Probe Requests, Probe Responses, Association Requests, and Reassociation Requests. Recall that management frames are always in the clear, even when WEP is enabled.
When the above methods fail, SSID discovery is done by active scanning

7)
Collecting the MAC Addresses :- The attacker gathers legitimate MAC addresses for use later in constructing spoofed frames. The source and destination MAC addresses are always in the clear in all the frames.

8)
Collecting the Frames for Cracking WEP :- The goal of an attacker is to discover the WEP shared-secret key. The attacker sniffs a large number of frames An example of a WEP cracking tool is AirSnort ( http://airsnort.shmoo.com ).

9)
Detection of the Sniffers :- Detecting the presence of a wireless sniffer, who remains radio-silent, through network security measures is virtually impossible. Once the attacker begins probing (i.e., by injecting packets), the presence and the coordinates of the wireless device can be detected.

10)
Wireless Spoofing :- There are well-known attack techniques known as spoofing in both wired and wireless networks. The attacker constructs frames by filling selected fields that contain addresses or identifiers with legitimate looking but non-existent values, or with values that belong to others. The attacker would have collected these legitimate values through sniffing.

11)
MAC Address Spoofing :- The attacker generally desires to be hidden. But the probing activity injects frames that are observable by system administrators. The attacker fills the Sender MAC Address field of the injected frames with a spoofed value so that his equipment is not identified.

12)
IP spoofing :- Replacing the true IP address of the sender (or, in rare cases, the destination) with a different address is known as IP spoofing. This is a necessary operation in many attacks.

13)
Frame Spoofing :- The attacker will inject frames that are valid but whose content is carefully spoofed.

14)
Wireless Network Probing :- The attacker then sends artificially constructed packets to a target that trigger useful responses. This activity is known as probing or active scanning.

15)
AP Weaknesses :- APs have weaknesses that are both due to design mistakes and user interfaces

16)
Trojan AP :- An attacker sets up an AP so that the targeted station receives a stronger signal from it than what it receives from a legitimate AP.

17)
Denial of Service :- A denial of service (DoS) occurs when a system is not providing services to authorized clients because of resource exhaustion by unauthorized clients. In wireless networks, DoS attacks are difficult to prevent, difficult to stop. An on-going attack and the victim and its clients may not even detect the attacks. The duration of such DoS may range from milliseconds to hours. A DoS attack against an individual station enables session hijacking.

18)
Jamming the Air Waves :- A number of consumer appliances such as microwave ovens, baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. An attacker can unleash large amounts of noise using these devices and jam the airwaves so that the signal to noise drops so low, that the wireless LAN ceases to function.

19)
War Driving :- Equipped with wireless devices and related tools, and driving around in a vehicle or parking at interesting places with a goal of discovering easy-to-get-into wireless networks is known as war driving. War-drivers (http://www.wardrive.net) define war driving as “The benign act of locating and logging wireless access points while in motion.” This benign act is of course useful to the attackers.
Regardless of the protocols, wireless networks will remain potentially insecure because an attacker can listen in without gaining physical access.

Tips for Wireless Home Network Security

1) Change Default Administrator Passwords (and Usernames)
2) Turn on (Compatible) WPA / WEP Encryption
3) Change the Default SSID
4) Disable SSID Broadcast
5) Assign Static IP Addresses to Devices
6) Enable MAC Address Filtering
7) Turn Off the Network During Extended Periods of Non-Use
8) Position the Router or Access Point Safely

Secure A Home Wireless Network - 10 Tips

Saturday, June 5, 2010 Posted by Sangram 0 comments
Secure A Home Wireless Network - 10 Tips
--
1.Change Your Router Default Password - A must in the first line of defense. Create a strong password with a mix of numeric, alpha and symbolic characters. Password length should be between 8 and 15 characters, or longer in length, and should not be obvious to you (such as kids or wife name, birthdays, favorite cars or sports teams, etc). If your wireless router includes a user name, it's a good idea to change it to another name other than the default name.
--
2.Rename and Disable SSID Broadcast on your Wireless Router - SSID (Service Set Identifier) is the network name or identifier for the wireless router. SSID's broadcast a beacon signal (usually about 10 times each second) which announces to the world that the network is live and ready to go.
--
3.Enable Infrastructure Mode - When using the "ad-hoc" mode, which lets clients set up peer-to-peer networks, rogue users will be able to connect to your network through a legitimate wireless client. This setting configuration can be found on your PC wireless network card.

--
4.Use MAC Addressing Filter On Your Wireless Router - Many routers let you restrict access to known MAC (Media Access Control) addresses. Each network device, such as a computer network card (NIC) has a unique MAC address. By allowing access only to pre-defined MAC addresses you can reduce the risk of rogue clients connecting to your home network.
--
5.Change the Default Router IP Address Setting - Router manufacturers set every router with an IP address. For example, Linksys routers are configured with an IP address of 192.168.1.1. These address settings are well known and published, and can be easily discover by hackers if they know the router manufacturer and type.
--
6.Use WPA or WPA2 PSK (Wi-Fi Protected Access with Pre Shared Key) Encryption - When possible use WPA or WPA2 PSK over WEP (Wired Equivalent Privacy). Both Windows XP and Mac OS X support them, along with any access point manufactured within the past few years. WPA and WPA2 both have a mode called the PSK mode that will allow you to use a password in lieu of using a full-blown 802.1X setup, which is perfect for the home user.
--
7.HTTPS, Firewall and Remote Access Settings On Your Wireless Router - Make sure HTTPS is enable for connecting to the router administration setup over your local network. Verify the firewall is enabled and all incoming ports are blocked. Disable remote access over the Internet setting.
--
8.Enable And Monitor Your Wireless Access Logs - Check your logs frequently for rogue access points (AP) or clients attached to the network. If you spot unknown clients or AP's connected to your network, change your WEP or WPA code, and do a little detective work in identifying unknown connections to your network.
Also check the status screen that shows the MAC addresses of all clients currently connected to the network and verify they are known devices.
--

9.Backup Your Router Configuration Settings - Although, not considered a security setting, backing up the router configuration before making changes will allow you to easily restore the settings in the event you make a mistake. This will prevent your router from being vulnerable if you are unsure about any changes you have made.
--
10.Turn off Your Wireless Router When Not In Use - Why would you want to do this? When your router is powered off, your network cannot be compromised. Consider doing this when you go on vacation or you will not be using you network for extended periods of time. Just turning off your PC may prevent the PC from being attacked, but it will not prevent someone from breaking into your network via your router if it is powered on.
----------------
Bonus Security Tip - Get in the habit of changing your router password every 30 to 60 days. Also change your PSK several times a year. Changing these two settings may just kick that un-detected guest off your network (take that neighbor!). Limit the maximum number of DHCP users allowed on your network to just the known number of PC's in your house. Limiting this setting can be an indication of someone on your network to you if one of your PC's cannot obtain an IP address from your router.
Labels:

Setting Up A Ftp:

Posted by Sangram 0 comments
Setting Up A Ftp:
Well, since many of us have always wondered this, here it is. Long and drawn out. Also, before attempting this, realize one thing; You will have to give up your time, effort, bandwidth, and security to have a quality ftp server.
That being said, here it goes. First of all, find out if your IP (Internet Protocol) is static (not changing) or dynamic (changes everytime you log on). To do this, first consider the fact if you have a dial up modem. If you do, chances are about 999 999 out of 1 000 000 that your IP is dynamic. To make it static, just go to a place like h*tp://www.myftp.org/ to register for a static ip address.
You'll then need to get your IP. This can be done by doing this:
Going to Start -> Run -> winipcfg or www.ask.com and asking 'What is my IP?'
After doing so, you'll need to download an FTP server client. Personally, I'd recommend G6 FTP Server, Serv-U FTPor Bullitproof v2.15 all three of which are extremely reliable, and the norm of the ftp world.
You can download them on this site: h*tp://www.liaokai.com/softw_en/d_index.htm
First, you'll have to set up your ftp. For this guide, I will use step-by-step instructions for G6. First, you'll have to go into 'Setup -> General'. From here, type in your port # (default is 21). I recommend something unique, or something a bit larger (ex: 3069). If you want to, check the number of max users (this sets the amount of simultaneous maximum users on your server at once performing actions - The more on at once, the slower the connection and vice versa).
The below options are then chooseable:
-Launch with windows
-Activate FTP Server on Start-up
-Put into tray on startup
-Allow multiple instances
-Show "Loading..." status at startup
-Scan drive(s) at startup
-Confirm exit
You can do what you want with these, as they are pretty self explanatory. The scan drive feature is nice, as is the 2nd and the last option. From here, click the 'options' text on the left column.
To protect your server, you should check 'login check' and 'password check', 'Show relative path (a must!)', and any other options you feel you'll need. After doing so, click the 'advanced' text in the left column. You should then leave the buffer size on the default (unless of course you know what you're doing), and then allow the type of ftp you want.
Uploading and downloading is usually good, but it's up to you if you want to allow uploads and/or downloads. For the server priority that will determine how much conventional memory will be used and how much 'effort' will go into making your server run smoothly.
Anti-hammering is also good, as it prevents people from slowing down your speed. From here, click 'Log Options' from the left column. If you would like to see and record every single command and clutter up your screen, leave the defaults.
But, if you would like to see what is going on with the lowest possible space taken, click 'Screen' in the top column. You should then check off 'Log successful logins', and all of the options in the client directory, except 'Log directory changes'. After doing so, click 'Ok' in the bottom left corner.
You will then have to go into 'Setup -> User Accounts' (or ctrl & u). From here, you should click on the right most column, and right click. Choose 'Add', and choose the username(s) you would like people to have access to.
After giving a name (ex: themoonlanding), you will have to give them a set password in the bottom column (ex: was faked). For the 'Home IP' directory, (if you registered with a static server, check 'All IP Homes'. If your IP is static by default, choose your IP from the list. You will then have to right click in the very center column, and choose 'Add'.
From here, you will have to set the directory you want the people to have access to. After choosing the directory, I suggest you choose the options 'Read', 'List', and 'Subdirs', unless of course you know what you're doing. After doing so, make an 'upload' folder in the directory, and choose to 'add' this folder separately to the center column. Choose 'write', 'append', 'make', 'list', and 'subdirs'. This will allow them to upload only to specific folders (your upload folder).
Now click on 'Miscellaneous' from the left column. Choose 'enable account', your time-out (how long it takes for people to remain idle before you automatically kick them off), the maximum number of users for this name, the maximum number of connections allowed simultaneously for one ip address, show relative path (a must!), and any other things at the bottom you'd like to have. Now click 'Ok'.
**Requested**
From this main menu, click the little boxing glove icon in the top corner, and right click and unchoose the hit-o-meter for both uploads and downloads (with this you can monitor IP activity). Now click the lightning bolt, and your server is now up and running.
Post your ftp info, like this:
213.10.93.141 (or something else, such as: 'f*p://example.getmyip.com')
User: *** (The username of the client)
Pass: *** (The password)
Port: *** (The port number you chose)
So make a FTP and join the FTP section
Listing The Contents Of A Ftp:
Listing the content of a FTP is very simple.
You will need FTP Content Maker, which can be downloaded from here:
ht*p://www.etplanet.com/download/application/FTP%20Content%20Maker%201.02.zip
1. Put in the IP of the server. Do not put "ftp://" or a "/" because it will not work if you do so.
2. Put in the port. If the port is the default number, 21, you do not have to enter it.
3. Put in the username and password in the appropriate fields. If the login is anonymous, you do not have to enter it.
4. If you want to list a specific directory of the FTP, place it in the directory field. Otherwise, do not enter anything in the directory field.
5. Click "Take the List!"
6. After the list has been taken, click the UBB output tab, and copy and paste to wherever you want it.
If FTP Content Maker is not working, it is probably because the server does not utilize Serv-U Software.
If you get this error message:
StatusCode = 550
LastResponse was : 'Unable to open local file test-ftp'
Error = 550 (Unable to open local file test-ftp)
Error = Unable to open local file test-ftp = 550
Close and restart FTP Content Maker, then try again.
Labels:

Google Announces Chrome Stable For Linux, Mac

Posted by Sangram 0 comments
Mountain View, California -- Google has moved the latest version of Chrome 5 for Windows out of beta and also announced stable versions of Chrome for Mac and Linux, and upgraded the browser for the first time withmany new features and speed, since launching the Web browser's fifth revision in less than two years.
--
The latest Windows version operates JavaScript 30% to 35% faster than the earlier version, according to Google.
--
The new stable release for Mac and Linux empowers users to synchronize bookmarks and browser preferences across multiple computers and platforms so consumers can feel at home no matter which machine they work on.
--
Preferences include color themes, homepage, startup settings, Web content settings and page zoom settings.
Labels:

How to hide blogger toolbar

Posted by Sangram 0 comments
How to hide blogger toolbar
login your blog
Goto layout> edit htmlPlace this code in under body code....
-----------------------
#navbar-iframe {
height:0px;
visibility:hidden;
display:none}
-----------------------
Labels:

How to Embed a YouTube Video on Your Blog

Posted by Sangram 0 comments
How to Embed a YouTube Video on Your Blog
How to Embed a YouTube Video on Your Blogger BlogTo embed your You Tube video into Blogger follow the following steps:
  • Select your YouTube video.
  • Copy the code from the box at the line that says embed. You will find the box directly to the right of the video.
  • Log into Blogger and create a new post.
  • Click on the edit HTML tab
  • Paste the code into the post.
  • Save your post.
Labels:

how to register a domain name

Posted by Sangram 0 comments
how to register a domain name
YOu can either go for paid domain names or you can easily open account any of the free domain names.
paid domains are available and gives you..sites like www.sangram.com
On other hand fre sites gives you
www.sangram.freewebs.com..

Go to Following websites and follow the Procedure !!
Its free and having some great Features!!try it out !
www.freedomain.co.
registerfree.com
www.free-webhosts.com/free-domain-names.php
Labels:

Tips and Tricks about GMAIL

Posted by Sangram 0 comments
Tips and Tricks about GMAIL


C: Compose new message.
Shift + C: Open new window to compose new message.
Slash (/): Switch focus to search box.
K: Switch focus to the next most recent email. Enter or "O" opens focused email.
J: Switch focus to the next oldest email.
N: Switch focus to the next message in the "conversation." Enter or "O" expands/collapses messages.
P: Switch focus to the previous message.
U: Takes you back to the inbox and checks for new mail.
Y: Various actions depending on current view:Has no effect in "Sent" and "All Mail" views.
Inbox: Archive email or message.
Starred: Unstar email or message.
Spam: Unmark as spam and move back to "Inbox."
Trash: Move back to "Inbox."
Any label: Remove the label.
X: "Check" an email. Various actions can be performed against all checked emails.
S: "Star" an email. Identical to the more familiar term, "flagging."
R: Reply to the email.
A: Reply to all recipients of the email.
F: Forward an email.
Shift + R: Reply to the email in a new window.
Shift + A: Reply to all recipients of the email in a new window.
Shift + F: Forward an email in a new window.
Shift + 1 (!): Mark an email as spam and remove it from the inbox.
G then I: Switch to "Inbox" view.
G then S: Switch to "Starred" view.
G then A: Switch to "All Mail" view.
G then C: Switch to "Contacts" view.
G then S: Switch to "Drafts" view.
Labels:

Google Search tricks

Posted by Sangram 0 comments
Google Search tricks

Enter just the word http for your search to find the top 1000 PageRanked sites.Enter only www in your search to see how Google ranks the top 1,000 sites.Manually type the following prefixes and note their utility:
--
link:url Shows other pages with links to that url.
related:url same as "what's related" on serps.
--
site:domain restricts search results to the given domain.
--
allinurl: shows only pages with all terms in the url.
--
inurl: like allinurl, but only for the next query word.
--
allintitle: shows only results with terms in title.
--
intitle: similar to allintitle, but only for the next word. "intitle:seoforgoogle google" finds only pages with seoforgoogle in the title, and google anywhere on the page.
--
cache:url will show the Google version of the passed url.
--
info:url will show a page containing links to related searches, backlinks, and pages containing the url. This is the same as typing the url into the search box.
--
spell: will spell check your query and search for it.
Labels:

Make your Desktop Icons Transparent

Posted by Sangram 0 comments
Make your Desktop Icons Transparent
Go to
Control Panel > System, > Advanced > Performance area > Settings button
--
Visual Effects tab
--
"Use drop shadows for icon labels on the Desktop"
Labels:

unwanted entries from ADD/REMOVE program

Posted by Sangram 0 comments
Run the Registry Editor
--
(REGEDIT).
--
Open HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Uninstall Remove any unwanted keys under "Uninstall."
Thats it.
Labels:

Uninstall unnecessary s/w

Posted by Sangram 0 comments
Uninstall unnecessary s/w
----------------------------------------
To uninstall things like msn messenger and other hidden installs thru add remove programs, do this:
--
find sysoc.inf (you might have to enable "show hidden files" and "show hidden/protected system folders" in explorer) and open it in notepad replace all ",hide" with "," (both with out quotes) which is easiest to do with the replace all command under edit then in add/remove programs under add/remove windows compnents and whole new list of things to uninstall and add are now listed (such as internet explorer)
Labels:

Recover a Corrupted System File

Posted by Sangram 0 comments
Recover a Corrupted System File
---------------------------------------------------
If an essential Windows file gets whacked by a virus or otherwise corrupted, restore it from the Windows CD. Search the CD for the filename, replacing the last character with an underscore; for example, Notepad.ex_. If it's found, open a command prompt and enter the command EXPAND, followed by the full pathname of the file and of the desired destination: EXPAND D:\SETUP\NOTEPAD.EX_ C:\Windows\NOTEPAD.EXE. If either pathname contains any spaces, surround it with double quotes.
Labels:

Performance Increase Through My Computer

Posted by Sangram 0 comments
Performance Increase Through My Computer

1.Start > Right Click on My Computer and select properties.
2.Click on the "Advanced" tab
3.See the "Perfomance" section? Click "Settings"
4.
Disable all or some of the following:Fade or slide menus into viewFade or slide ToolTips into viewFade out menu items after clickingShow Shadows under menusSlide open combo boxesSlide taskbar buttonsUse a background image for each folder typeUse common tasks in folders.
Labels:

Format a Hard Drive with Windows XP

Posted by Sangram 0 comments
Format a Hard Drive with
Windows XP
====================
# To format a hard drive with Windows XP or 2000, insert Windows CD and restart your computer.# Your computer should automatically boot from the CD to the Windows Setup Main Menu.# At the Welcome to Setup page, press ENTER
--
.# Press F8 to accept the Windows XP Licensing Agreement.# If an existing Windows XP installation is detected, you are prompted to repair it. To bypass the repair, press ESC.
--
# Use the ARROW keys to select the partition or the unpartitioned space where you want to create a new partition. Press D to delete an existing partition, or press C to create a new partition.
--
# Type the size in megabytes (MB) that you want to use for the new partition, and then press ENTER, or just press ENTER to create the partition with the maximum size.

--# Select the format option that you want to use for the partition (Recommended: NTFS), and then press ENTER.
--
# After the Windows Setup program formats the partition, follow the instructions that appear on the screen to continue installing Windows.
its done.
Labels:

Free disc space by deleting Restore point

Posted by Sangram 0 comments
Free disc space by deleting Restore point
Follow the following Path>>
--
Start button-all programs-accessories-system tools-cleanup-more options. You will have the option of deleting your restore points.When your done creat onerestore point as a back up.
--
Enjoy.
Labels:

Free disc space by deleting Restore point

Posted by Sangram 0 comments
Free disc space by deleting Restore point
Start button-all programs-accessories-system tools-cleanup-more options. You will have the option of deleting your restore points.When your done creat onerestore point as a back up.

Enjoy.
Labels:

Free disc space by deleting Restore point

Posted by Sangram 0 comments
Free disc space by deleting Restore point
Start button-all programs-accessories-system tools-cleanup-more options. You will have the option of deleting your restore points.When your done creat onerestore point as a back up.

Enjoy.
Labels:

Hide ur drives || Lock ur drives

Posted by Sangram 0 comments
Hide ur drives Lock ur drives
--
Open Registry (go to run command, type "regedit" and press enter)then go to this key
--
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorernow
--
right click in right side pane and create DWORD Value (blue color)
--
Rename it as "NoViewOnDrive" (for locking drive)orRename it as "NoDrives" (for Hiding drive)
--double click on it and put some numbers to lock ur desired Drive and click ok.
-- ITs done
Labels:

Connecting two Lans in Different Locations

Posted by Sangram 0 comments
Connecting two Lans in Different Locations

Let’s say you are currently operating an office of 10~50 users, running Windows Server 2000/2003, mainly to share printers and files. You need to open a new office or add new location to work from. You want to create a WAN or VPN so that the users can still access files on the server. Your current Internet setup is ADSL Modem, to a Router, to a switch. Server connects to the Switch and the rest of the office connects to a switch also. Also, another possibility is to say you just want to connect your Home to your Network at work. Or even two different networks in your building.What you basically want is a network like the attached Image below. Set up each site as its own network but using different private address ranges. If you have a different private addressing scheme in place at the main site (eg 192.168.2.xxx or something) then keeping that is fine, just make sure that the one you use at the new site doesn't overlap. When you connect the two sites, they'll just see each other as one big network, so in that diagram below the people in the new site will be able to ping 192.168.1.2 and just get to the right machine at the old site. Everyone will be on the same gateway as programmed into each routerThere are two basic options for how you connect the two sites. The first is to run a private link between them. Typically this would be something like ISDN, frame relay or Ethernet, depending on distance, speed requirement and how much money you have to throw at it. This is generally the more expensive option, although it's also the most reliable.The other is to give each site a decent (cable/ADSL) Internet connection and set up a VPN pass-through. By configuring the VPN on the two routers, the machines at each end have no idea what's in the middle; they just see the other site as a network which is reachable through the router. This is generally cheaper, but you're relying on your ISP for performance.

--
If you do this, pay particular attention to the upload speeds your ISP offers, because the transfer speed between the sites will be kept to the slower of the sending site's upload and the receiving site's download. Normal ADSL is capable of up to 1.5 Mbps uploads, but many ISPs throttle it to far less.For the VPN method, some of the higher-end consumer gear can set up a VPN tunnel over an Internet connection. For the direct link, you'll be looking at a proper Cisco router or similar brand. Although, Cisco now owns Linksys and their BEFSX41 router will also work just fine.(See *-Note)The important thing I don't want to forget to mention is that you need to look for in the specs is the ability for the router to maintain a VPN connection by itself. Just about every consumer router will support 'VPN pass-through', which is just letting the PCs behind the router do VPN stuff, but only some will maintain the VPN tunnel themselves.The other thing you'll need at each end is a static IP address on the Internet connection -- dynamic DNS and IPsec VPNs generally don't mix.*-Note! The BEFSX41 Linksys Instant Broadband™ EtherFast® Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint is the perfect .

--
solution for connecting a small group of PCs to a high-speed broadband Internet connection or a 10/100 Ethernet backbone. The Router can be configured to limit internal users’ Internet access based on URLs and/or time periods - URL filtering and time filtering. For enhanced protection against intruders from the Internet, the Router features an advanced Stateful Packet Inspection firewall. Use the Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint to create IPSec VPN tunnels, so you can securely connect to the corporate server from your home office—or any location when you’re on the road. The Router provides a dedicated port for DMZ hosting and acts as the only externally recognized Internet gateway on your local area network (LAN). With the performance and security features of the Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint, your network will take advantage of the Internet while keeping its data secure.

--
Another Option is a WRVS4400N Wireless-N Gigabit Security Router with VPN, Secure, high-speed wireless networking for growing businesses or gaming family.• Wireless-N offers greater speed and coverage than Wireless-G, while at the same time being backwards compatible with 802.11b and g devices• SPI Firewall, and Intrusion Prevention secure the work from outside threats• QuickVPN IPSec VPN tunnel support provides secure remote user connectivity• Support for WMM provides improved QoS over wireless connections for better video and voice performanceThe WRV200 Wireless-G VPN Router with RangeBooster, Secure, smart wireless networking for growing Businesses.• RangeBooster (MIMO) technology for dramatically increased range• SPI Firewall, Encryption, and VPN support makes your network secure• Multiple BSSIDs and VLANs provide separate secure networks• Enhanced QoS for both Wireless and wired provide improved quality voice/video
Labels:

Internet Cleaner

Posted by Sangram 0 comments
Internet Cleaner
Internet Cleaner helps you remove all traces of your online and offline activity, including the list of recently visited sites, browser cache and cookies (IE, Firefox, AOL, MSN, Mozilla, Opera and Netscape Navigator are supported), lists of recent documents in various applications (MS Office, Paint, Media Player, WordPad, Acrobat Reader, ACDSee and more) and protect your privacy by erasing the traces of Messenger, Email, News, P2P programs.

DOWNLOAD
http://rapidshare.com/files/90067604/Internet.Cleaner.v3.4.rar
Labels:

How much does laser hair removal cost ?

Posted by Sangram 0 comments
How much is the cost of laser hair removal?
--
To answer your question? Here are some of the factors that will affect how much you will pay for laser hair removal.
1. Whey you live. Of course, there are always price variations depending on your geographic location. The cost of laser hair removal differs from state to state and even from country to country.
2. Size of the area treated. Large areas, such as the entire back or the entire legs, will cost considerably more than smaller areas, such as the upper lip.

3. Number of laser hair removal treatments. Almost everyone has to have multiple treatments. This is because hair is always in the growth phase. The total number of treatments you will need depends on your hair color, skin color, and the thickness of your hair.

4. Type of laser hair removal equipment used. There arpricinge a variety of different types of laser hair removal equipment on the market. Depending on the equipment used, pricing can vary.


--
Here is very general average pricing information in the U.S for commonly treated areas. You can estimate other areas based on the size. Keep in mind that these are just estimates based on consumers reporting what they have paid for treatments on various forums:
Labels:

LASER HAIR REMOVAL

Posted by Sangram 0 comments
LASER HAIR REMOVAL
--
Laser hair removal works by passing a beam of light through the skin. The laser targets dark pigment called melanin in the hair. When the beam strikes the hair follicle (where hair growth), the intense heat destroys the hair follicle instantly. Hair removal laser treatment may be the best form of hair removal. Some people think laser hair removal is only available to be performed on the face, not at all!
--

This treatment can be used on virtually any part of the body including the very delicate skin of the peritoneum.Most candidates choose Epilation by laser as a last resort after trying nearly every type of hair removal product available on the marketIf you are interested in laser hair growth as a method of permanent hair removal.
--
This website will explain in detail everything you need to know about laser hair removal treatment , a credible resource to research Epilation by laser, including costs associated with the procedure, the number of treatments that will be needed, Is laser hair removal right for me?, and other frequently asked Laser Hair Removal Guide Index
Introduction to Laser hair Removal
Benefits of Laser Hair Removal
How much does laser hair removal cost ?
Laser Hair Removal MachinesLaser facial hair removal.
Lip Hair Removal laserOptions

--
Labels:

Feedjit