You would have added your signature in your Gmail account, this signature is automatically appended to composed email at the end of the content. Signature is displayed to the recipient after recipient clicks on "..." (ellipses) button saying "show trimmed content" when hovered over it.
How to run Turbo c in windows 7 using Dosbox
You might have faced difficulty while running Turbo C in windows 7, it is because Turbo C is not compatible with Windows 7, as it was with earlier versions of Windows like XP and Vista. Many students and programmers would have faced this difficulty to load Turbo c in windows 7, so in this post I am going to show you how to load Turbo c in Windows 7.
- In order to load turbo c you need to have dosbox, which is an emulator that recreates a MS-DOS compatible environment. Dosbox is mainly used to run dos games and old applications. We will use it to run Turbo C in windows 7. Download Dosbox 0.74 and install it as you install any other software.
Stop VlC Always Fit Window Setting
In previous post we saw how to stop VLC from Font caching, Here we will he how to stop Vlc from automatically fitting or scaling video to the window size.
Many times resolution of video is greater than that of the windows or operating system's default or customized resolution, so VLC scales the video resolution to the window resolution and fits display to window and this is the default option selected when VLC is installed i.e. "always fit window" under Video menu.
Many times resolution of video is greater than that of the windows or operating system's default or customized resolution, so VLC scales the video resolution to the window resolution and fits display to window and this is the default option selected when VLC is installed i.e. "always fit window" under Video menu.
Download YouTube Videos in Mp3 Format
YouTube by Google is a good source to view and download videos uploaded by various people. Youtube provides millions of videos containing tutorials of any software and tricks to tweak computer. It also contains music videos of many movies and albums by various artists. We are able to download videos of Youtube using softwares like Internet Download Manager (IDM) and Youtube Downloader.
Downloading complete videos may not be required by you because of Downloading limit provided by your Internet Service Provider or you may be interested in youtube music file i.e. youtube mp3, the audio file attached with youtube videos. Following are three sites that I found best to download Mp3 from Youtube.
How to get Java Source code from jar files
In the post we learnt how to get Java Source Code from .apk files, Here in this post we will learn how to get Java Source files from .jar files.
what is .jar file ?
jar is acronym of the Java Archive file. basically it contains all java class files and packages that are required or created to build an application. Jar file may also store images and metadata files that are associated with application. Jar file allows Java runtime to efficiently deploy a set of classes and their associated resources. jar files can be created using the command "jar" that is installed when Java Virtual Machine is installed.
How to stop VLC Building font cache again and again
VLC is one of the best media players available to view videos and listen music. Vlc is having good functionality but sometimes you might be annoyed due its repeated process of building font cache at the time when you start your VLC to play any video files that have subtitles or even while displaying name of the file being played.
What does Building font cache mean ?
Generally whenever VLC is loaded it scans for fonts in the system that are required to display title or subtitles of the movie being played. It finds the fonts and copies it in the cache memory for any further reference.
As it scans whole system it may take time to do this process, but most of users like me gets annoyed by constant rebuilding font cache process, so here's the solution of this problem.
Steps to stop VLC Building font cache.
- Goto Tools menu and select Preferences or press ctrl+p.
- Select "All" from show setting tab in the bottom left corner.
- select "videos" from available list of options and select subtitles/osd option from videos tab
- Now select "Dummy font renderer" from Text rendering module
- Press on save button.
That is all you need to do to stop VLC to search fonts from the system again and again.The next time you open VLC, you will be free from that annoying cache-building dialog.
How to Download Torrent Files using IDM
Downloading torrents proves to be beneficial when its speed is at maximum. But most of the time we get low speed when seeders decreases or they reduce their uploading limit.To increase uploading limit of seeders is not in our hands but we can find alternative to improve our downloading speed.
One of the best practice is to download torrent file using IDM (Internet Download Manager), but question arises how can we download torrent files using IDM. Don't worry there's a simple way to do this using zbigz which I have described below. Just follow few simple steps and you are done.
One of the best practice is to download torrent file using IDM (Internet Download Manager), but question arises how can we download torrent files using IDM. Don't worry there's a simple way to do this using zbigz which I have described below. Just follow few simple steps and you are done.
How to get source code from apk file
What is .apk file?
APK file is nothing but Android Package File(APK). APK is the file format used to distribute and install application software and middleware on Google's Android operating system.
Apk Files are Zip file formatted packages based on the JAR file format, with .apk extension. Apk files contains all program resources and code i.e it contains .dex files, resources, assets, certificates, and manifest file.
APK file is nothing but Android Package File(APK). APK is the file format used to distribute and install application software and middleware on Google's Android operating system.
Apk Files are Zip file formatted packages based on the JAR file format, with .apk extension. Apk files contains all program resources and code i.e it contains .dex files, resources, assets, certificates, and manifest file.
Google Fiber: World's Fastest Internet Connection
The Web search leader Google is launching its ultra-fast 1Gb-per-second Google Fiber Internet and Fiber TV service. Google announced last week that the gigabit network was coming.
The service uses optical fiber to deliver speeds far in excess of traditional web services – offering speeds faster than almost anywhere else on Earth.
In present days it is dominated by Time Warner Cable Inc, which charges $99.95 for its fastest Internet-only service there. Google Fiber would be 20 times faster.
Close all Windows With Single Click
Sometimes we open lot of Windows applications to get our work done. But the main task starts after completing work. The most hectic task is to close those Windows which were opened while working. Closing them one by one involves lot of time and when we are in rush we directly close our Windows which may result in loss of data.
The point is what to do? Even if we use task manager we have to click on ‘End Now’ option. We usually use Alt+F4 combination, but sometimes it also doesn’t work. Tool known as Close All can be used to solve hectic situation.
Close All is a portable tool that allows to close multiple Windows with one click.When we install this application, it creates a small icon of the tool in Quick Launch bar as shown in the screenshot below.
Installing Close All:-
Close All Windows is a very simple utility that doesn’t require installation. No settings are stored in the Windows Registry or file system. Just follow the steps below to set it up on your computer.
- Download the ZIP archive and extract it on your hard drive.
- Open the extracted folder, right-click CloseAll.exe and choose Send To -> Desktop (create shortcut) from the context menu.(If system you are working is 64 bit then use x64 folder)
- Switch to the Desktop and rename the created shortcut to “Close All” or whatever you want.
- Now you can drag this shortcut to the Quick Launch Bar or to the Windows 7 Taskbar for quick access.
Advanced Options:-
If you want to prevent certain applications from being to be closed by Close All, you can add a simple exclusion list to the CloseAll.exe command line.
- Right-click the shortcut and choose Properties from the context menu:
- Go to the Shortcut tab, Target and add -x="app-to-exclude.exe":
- You can separate multiple values with “|” (pipe),
- example: -x="vlc.exe|firefox.exe|msnmsgr.exe"
- Click OK to save the shortcut properties.
- Now you can use it normally but with some excluded application to be closed.
Download Close All
Jailbreaking and its Basics
What is Jalibreaking?
Many smartphone, tablet, and game console makers include a layer of Digital Rights Management (DRM) software on their products. This DRM exists either to limit the software you can run on it, or is there for security reasons. Jailbreaking is the process of hacking these devices to bypass DRM restrictions, allowing you to run "unauthorized" software and to make other tweaks to your operating system.
Technically, jailbreaking can be thought of as the process of installing "a modified set of kernel patches (the kernel being the supervisor of the operating system) that allow you to run unsigned code. It also gives you root-level access, which is otherwise unavailable. The term "root" comes from UNIX, where it is the superuser account that has unrestricted rights and permissions to all files. This provides you with added flexibility, but it also has some inherent dangers.
Why to jailbreak your idevice?
One of the main reasons for jailbreaking is to expand the feature set limited by Apple and its App Store while the other is to customize the look of your device.Most jailbreaking tools automatically install Cydia, a native iOS Advanced Packaging Tool(APT) client used for finding and installing software for jailbroken iOS devices. Since software programs available through Cydia are not required to adhere to App Store guidelines, many of them are not typical self-contained apps but instead are extensions and customizations for iOS and other apps.
Why not to jailbreak your Idevice?
Once you do it, you're on your own. You may have voided your warranty, so you can't rely on Apple, AT&T or Verizon, to fix any problems you encounter. All of the applications that jailbreak your phone are unauthorized and could damage or completely disable your iPhone. Your smartphone could end up as nothing more than a very expensive useless device.
Is jailbreaking legal ?
It depends on who you ask, as far as the US government is concerned, it is legal to jailbreak your smartphone. In 2010, the Digital Millennium Copyright Act (DMCA) recognized the arguments of the Electronic Frontier Foundation (EFF, the international non-profit digital rights advocacy organization) to add phone jailbreaking to a list of exemptions to anti-circumvention provisions.
On the other hand, Apple and some other companies, continue to plead with regulators to outlaw the practice. The best they can do at this point is tell users that jailbreaking defies their terms of use and voids the warranty. In other words, while you don't risk being arrested just for jailbreaking, don't expect any help from the Apple Store genius when your hacked iPhone has a problem.
Many smartphone, tablet, and game console makers include a layer of Digital Rights Management (DRM) software on their products. This DRM exists either to limit the software you can run on it, or is there for security reasons. Jailbreaking is the process of hacking these devices to bypass DRM restrictions, allowing you to run "unauthorized" software and to make other tweaks to your operating system.
Technically, jailbreaking can be thought of as the process of installing "a modified set of kernel patches (the kernel being the supervisor of the operating system) that allow you to run unsigned code. It also gives you root-level access, which is otherwise unavailable. The term "root" comes from UNIX, where it is the superuser account that has unrestricted rights and permissions to all files. This provides you with added flexibility, but it also has some inherent dangers.
Why to jailbreak your idevice?
One of the main reasons for jailbreaking is to expand the feature set limited by Apple and its App Store while the other is to customize the look of your device.Most jailbreaking tools automatically install Cydia, a native iOS Advanced Packaging Tool(APT) client used for finding and installing software for jailbroken iOS devices. Since software programs available through Cydia are not required to adhere to App Store guidelines, many of them are not typical self-contained apps but instead are extensions and customizations for iOS and other apps.
Why not to jailbreak your Idevice?
Once you do it, you're on your own. You may have voided your warranty, so you can't rely on Apple, AT&T or Verizon, to fix any problems you encounter. All of the applications that jailbreak your phone are unauthorized and could damage or completely disable your iPhone. Your smartphone could end up as nothing more than a very expensive useless device.
Is jailbreaking legal ?
It depends on who you ask, as far as the US government is concerned, it is legal to jailbreak your smartphone. In 2010, the Digital Millennium Copyright Act (DMCA) recognized the arguments of the Electronic Frontier Foundation (EFF, the international non-profit digital rights advocacy organization) to add phone jailbreaking to a list of exemptions to anti-circumvention provisions.
On the other hand, Apple and some other companies, continue to plead with regulators to outlaw the practice. The best they can do at this point is tell users that jailbreaking defies their terms of use and voids the warranty. In other words, while you don't risk being arrested just for jailbreaking, don't expect any help from the Apple Store genius when your hacked iPhone has a problem.
BSNL Penta Tpad WS802C features and Specifications
As mentioned earlier in a post BSNL has launched 3 android tablets that are to be sold at an affordable prices. with this BSNL has entered in competition with Aakash tablet which is considered as a low cost tablet. Though Penta tpad has better specifications than Dantawind's low cost table Aakash.
Following are features of Penta Tpad WS802C:-
The costliest amongst the three is the Tpad WS802C which
has an 8 inch capacitive screen. It comes with a faster 1.2 GHz processor and 512 MB RAM. The internal memory is also bigger at 4 GB. Rest of the features like GPS, camera and Bluetooth are
same as the 704C and is expected to be at price of RS 13500.00 It is available in white color.
BSNL Penta Tpad WS704C features and Specifications
As mentioned earlier in a post BSNL has launched 3 android tablets that are to be sold at an affordable prices. with this BSNL has entered in competition with Aakash tablet which is considered as a low cost tablet. Though Penta tpad has better specifications than Dantawind's low cost table Aakash.
The second tablet is named ‘Penta Tpad ws704c‘. It has the same specification as 701r but offers added 3G connectivity which supports both CDMA/EVDO and GSM, inbuilt A-GPS, Accelerometer and Bluetooth. It also comes with a 2 megapixel rear camera and also has bigger 512 MB RAM for faster performance. It is available in Black color at the price of RS 10999.00
BSNL Android Tablets
BSNL in association with Pantel Technologies announced three Android tablets, with the name Penta Tpad in the market.Pantel Technologies is a Nokia based company.Among these three tablets one comes with 7-inch screen tablet with resistive screen and it runs on Android 2.3 operating system, while the second comes with 7.7-inch screen and the third tablet comes with an 8-inch capacitive touch screens but with a higher price.
These Three tablets are named as Penta tpad series as
Penta TPAD IS701R
Penta TPAD WS704c
Penta TPAD WS804c
Surf Anonymously using Proxy settings
Sometimes while surfing on internet, firewall or other settings would have blocked you to visit to certain sites in your company or in any other institutes. One solution to this problem is to use the proxy servers which lets you to hide your original ip address and hide your identity.Just knowing the proxy address isn't enough, you need to change your browser settings too.
Here's how you can get proxy adderss and a port number through which you can set your browser to surf anonymously on internet with few steps of settings.
Here's how you can get proxy adderss and a port number through which you can set your browser to surf anonymously on internet with few steps of settings.
Let Windows system speak whatever you write
It would be great if your computer speaks out what you write.As you know that windows operating systems provide a built in voice that can be customized from control panel. also it can be used for various softwares and scripts as done in this post.You can use it just for fun or for knowing the pronunciation or to check the system sound.Whatever the purpose may me here is the VB script that can be used to make windows system speak out what you need.
How To Run µTorrent In Hidden and Locked Mode
Few days back I received a mail, asking me to show the way to run a µTorrent in hidden mode at start-up. Here in this post I will describe how to hide µTorrent from being displayed at start-up and enabling password protection to access it.This can be achieved by the additional features supported by the µTorrent.Perform following simple steps to hide µTorrent.
Flipkart buys LetsBuy
From few days there was a news that flipkart will be buying letsbuy and today Flipkart has officially confirmed the acquisition of Letsbuy and added that it is a combination of cash and equity. Flipkart co-Founder & CEO Sachin Bansal said that the acquisition opportunity came at a very attractive price. The exact amount of the deal has not been disclosed.
What is Phishing and Types of Phishing
Phishing
Phishing is an e-mail fraud method. In Phishing an intruder(phisher) sends an email legitimate-looking email in an attempt to gather personal and financial information from recipients.Mail seems to be from the well known company and lure victim to input their personal information.Phishing is a easy and common method used by intruders to get access to victim's account information.
Phishing is an e-mail fraud method. In Phishing an intruder(phisher) sends an email legitimate-looking email in an attempt to gather personal and financial information from recipients.Mail seems to be from the well known company and lure victim to input their personal information.Phishing is a easy and common method used by intruders to get access to victim's account information.
Amazon In India as Junglee
American online retail giant Amazon which is worth $ 48 billion company has started operations in India with junglee.com, an online shopping site.Junglee is an online shopping service by Amazon which enables customers to find and discover products from online and offline retailers in India and from Amazon.com.
Difference Between Virus,Worm,Trojan
One common mistake that people make when the topic of a computer virus arises is to refer a worm or Trojan horse as a virus though they are different from each other.All three harms the computers but have differences and cannot be treated as same.Following gives brief overview of each of them.
What is System Idle Process?
You would have come across the process running in your system called "System Idle Process". Anyone who had used Windows must be knowing about it but recently one reader asked me about it and why it is consuming so much CPU memory when other applications are hardly able to run.
Basics About QR Code
IBM Develops a Lithium-Air Battery With a 500-Mile Range
Electric-vehicles can be much better for the environment--and they're geekier--because you’re driving with pure energy. The biggest downside right now is that energy does not last very long with the smallish capacitance of lithium-ion car batteries that you have to charge overnight.
Avail Facebook Group Video chat(Hangout)
We know that there is feature of group video chat available in Google Plus as Hangout.Many users are waiting for Facebook to allow same group video chat facility.Here is an application which I came to know that is available in Facebook to do group chat.
Download Google Books In PDF Format
Some of my blog readers asked me about how to download Google books, In this post I will describe the tool that allows
anyone to download all readable books and magazines from Google Books. Google
Books Downloader is a free application for the Windows and Mac
operating system. The program needs to be installed, and it is optional to install Arccosine, which is not needed for the
program’s core functionality.
Sign-in Google Music outside USA
Well there is nothing more to brag about how good it is, as it is served by Google. Google has officially launched its Music in US only, with probably around 20,000 tracks yet so far. But here I am going to tell you how you can access Google Music outside US.
Remove Applications Manually from the Context Menu in Windows
Last time we saw how to start command prompt from the context menu, here we see how to remove commands from context menu. As windows accumulates context menu items any time you install several applications. Not all applications end up on the context menu but enough do so over time that the menu can become cluttered. You might find yourself wondering, “How did that get there?” You may not want it on the context menu, but it is there and you are stuck with it. Or are you? No, you are not.
Subscribe to:
Posts (Atom)