Translate

Tuesday, July 26, 2011

Rename Recycle Bin




You can change the name of Recycle Bin Just go to Start click on Run Type regedit a tab of registry editor will be opened now expand HKEY_CLASSES_ROOT \ expand CLSID \ expand {645FF040-5081-101B-9F08-00AA002F954E} \ click on ShellFolder now change the value of Attribute from 40 01 00 20 to 50 01 00 20
and now change the CallForAtributes dword value to 0. After performing these steps close all open tab and refresh once and now right click on Recycle Bin and change the name whenever you want

Interesting News: How to delete Gmail Account

Interesting News: How to delete Gmail Account

Saturday, July 09, 2011

How to delete Gmail Account

Sometimes we need to delete our gmail  account for this just go to the settings shows at the top right
Bottom of the page

Now just click on Account and Import and go to google Account setting

Now you see the My products option just click here on Edit 

Here you will see the two major option
1.       Delete a product
2.       Delete Account

Now click on delete account  just tick mark to the squre box as ur services and the yes I want to delete my account just write your password and click on Delete google Account..

That’s all You have deleted your account permanently 

Saturday, June 11, 2011

How to Recover Hacked Email Accounts



It can be a real nightmare if someone hacks and takes control of your
email account as it may contain confidential information like bank
logins, credit card details and other sensitive data. If you are one
such Internet user whose email account has been compromised, then this
post will surely help you out. In this post you will find the possible
ways and procedures to get back your hacked email account.


For Gmail:

It can be a big disaster if your Gmail account has been compromised as
it may be associated with several services like Blogger, Analytics,
Adwords, Adsense, Orkut etc. Losing access to your Gmail account means
losing access to all the services associated it with too. Here is a
list of possible recovery actions that you can try.

Step -1: Try resetting your password since it is the easiest way to
get your account back in action. In this process Google may ask you to
answer the secret question or may send the password reset details to
the secondary email address associated with your compromised account.
You can reset you password from the following link

Gmail Password Reset Link-https://www.google.com/accounts/recovery




If you cannot find success from the Step-1 then proceed to Step-2.


Step-2: Many times the hacker will change the secret question and
secondary email address right after the account is compromised. This
is the reason for the Password Reset process to fail. If this is the
case then you need to contact the Gmail support team by filling out
the account recovery form. This form will ask you to fill out several
questions like

1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…

You need to fill out this form as much accurately as possible. It is
obvious to forget the dates of last login, account creation and
similar terms. However you need to figure out the closest possible
date/answers and fill out this form. This is your last chance! The
more accurate the information filled out in the recovery form, the
more the chances of getting your account back. You may reach the
account recovery page form the following link

Account Recovery Form-go to this link
https://www.google.com/accounts/recovery

How to Block Unwanted Emails



Do you want to  block unwanted emails. Do you want to
block those annoying offers and newsletters that reach your inbox?
Well here is a way to block all those unwanted and annoying emails
that you do not want to see or read! With this trick you can block
individual email address or the whole domain from which you do not
want the emails to come from. Here are the step-by-step instructions
to do this.


For Gmail

1. Login to your account

2. At the top-right corner, click on Settings

3. Under Settings, click on Filters

4. You’ll now see an option “Create a new filter“, click on it

5. Now in the From field enter the email address from which you do not
want to receive the emails

For ex. you may enter john@gmail .com in the From field to block all
incoming emails from this address. However if you want to block the
whole domain then use the following syntax: *@xyz.com. Now all the
incoming emails from the domain xyz.com will be blocked.

6. Click on Next Step, select the action you’d like to take on the
blocked emails. You may select the option Delete it so that the
blocked email is moved to trash. To unblock the email, all you need to
do is just delete the filter that you’ve created.

http://www.gohacking.com/2010/03/how-to-block-unwanted-emails.html
--

Friday, May 27, 2011

Download Windows 8 Theme for Windows 7


Aero Lite with Glass is a Windows 8 theme for Windows 7. You can install this theme on Windows 7 to get a Windows 8 like look and feel instantly.
Along with the Windows 8 like interface, the theme also implements Windows 9 like back and forward buttons in Windows Explorer. This is done by explorerframe.dll which is included in the theme folder.
The theme also includes Start ORB bitmaps, which puts Windows 8 Start ORB in Windows 7. Download Windows 8 Theme for Windows 7 and install this Theme on window 7 to get a Windows 8 like look and feel.

How to remove background from an image using Photoshop


Refer To
Do you want to remove background of an image using Photoshop? It can be done in many ways. For instance, you can select the main object using the selection tool, apply feather, and then cut it from the image to paste it on a transparent layer.
But, like the selection method, all other ways to remove background are very long and time consuming. Here’s the fastest way, use the Background Eraser tool.
Background Eraser tool helps you quickly delete the background from an Image by sampling similar colors in the circumference of the brush. Using this tool is very easy. Open your image in Photoshop, and select the Background Eraser tool, in the Eraser section, from the toolbox.
In the Background Eraser tool options at the top, choose the hard round brush, and choose the brush size according to your image size. If your image is large, choose relatively bigger brush. Set the ‘limit’ option to Find Edges, ‘tolerance’ option to 23% and ‘sampling’ to continuous.
That’s it. Now use this Background Eraser tool to click around the desired object and you will see that it deletes the background quite easily. Just make sure that the plus sign in between of the brush don’t get inside of your selected object. Make sure its always on the background you want to delete.
Once the background is removed from an image, you can save it in png or gif format to ensure that the background remains transparent.

Wednesday, May 04, 2011

!dea,Vodafone,Bsnl,Airtel,Aircel,Reliance,Uninor,Tata DoCoMo,Virgin,S-Tel Manual Gprs Setting


1-Manual Idea Gprs Setting
 To get GPRS settings SMS SET to 54671 (Toll free)   
  1. Account Name - idea_GPRS
  2. Username - Blank
  3. Password – Blank
  4. Homepage - http://wap.ideafresh.com
  5. Proxy and Server Port - 8080
  6. Proxy and Server address - 10.4.42.45
  7. Data bearer - GPRS / Packet data
  8. Access Point Name - imis
  9. Proxy - Enabled/yes
  10. Authentication Type - Normal
2-Manual BSNL Gprs Setting(For EAST Zone)


sms GPRS to 53733 to get setting

  1. Account Name - BSNL EAST
  2. Username - <Blank>
  3. Password - <Blank>
  4. Proxy - Enabled/yes
  5. Homepage - http://bsnllive.in
  6. Proxy and Server address – 192.168.81.163
  7. Proxy and Server Port - 8080
  8. Access Point Name – www.e.pr
  9. Data bearer - GPRS/ Packet data
  10. Authentication Type – Normal
3- Manual BSNL MMS Setting

  1.        Account Name-BSNL MMS
  2.       Username – blank
  3.        Password – Blank
  4.        Port – 8080
  5.       Server Address – 10.210.10.11
  6.        APN – mmseast.cellone.in
  7.        Homepage – http://bsnlmmsc.in

4- Manual Vodafone Gprs/live Setting

SMS ACT VL to 144 after activating Vodafone live SMS VL or WWW to 52586 to get setting(toll free)

  1.   Account Name-Vodafone GPRS
  2.   Username – Blank
  3.   Password – Blank
  4.   Homepage – http://live.vodafone.in
  5.   Proxy and server port – 9401(or 8080)
  6.   Proxy and server Address – 10.10.1.100
  7.   Data bearer – Packet Data
  8.   Access Point Name – portalnmms
  9.   Proxy – Enabled/Yes
  10.   Authentication Type - Normal 

5- Manual Airtel Gprs Setting

To get GPRS setting sms MO to 52567(toll free)

  1. Account – Mobile Office
  2. Homepage – http://www.google.com
  3. User Name - Blank
  4. Password - Blank
  5. Proxy - Enabled/yes.
  6. Proxy and Server Address - 202.56.231.117
  7. Proxy and Server Port - 8080
  8. Data bearer - GPRS or Packet Data.
  9. Access Point Name - airtelgprs.com
  10. Authentication Type – Normal

6- Manual Airtel Live Setting
  1. Account Name - Airtel_live
  2. Homepage - http://live.airtelworld.com
  3. Username - Blank
  4. Password - Blank
  5. Proxy - Enabled/yes
  6. Proxy and Server Adress - 100.1.200.99
  7. Accespoint Name - airtelfun.com
  8. Proxy and Server Port - 8080
  9. Data bearer - GPRS/ Packet Data
  10. Authentication Type - Normal
7- Manual Aircel Gprs Setting
To get GPRS Setting sms PI or ALL to 121(toll free)
  1. Account Name – Aircel Online
  2. Homepage - http://www.google.com
  3. Username - Blank
  4. Password - Blank
  5. Proxy - Enabled/yes
  6. Proxy and Server Address – 192.168.035.201
  7. Access point Name - aircelwap
  8. Proxy and Server Port - 8081
  9. Data bearer - GPRS/ Packet Data
  10. Authentication Type - Normal
8-Manual Reliance GPRS Setting
SMS ALL to 55100 to receive WAP/GPRS/MMS settings (toll-free).
  1. Account Name – rwap
  2. Homepage - http://wap.rworld.co.in
  3. Username - Blank
  4. Password - Blank
  5. Proxy - Enabled/yes
  6. Proxy and Server Address 10.239.221.7
  7. Access point Name - smartwap
  8. Proxy and Server Port – 8080
  9. Data bearer - GPRS/ Packet Data
  10. Authentication Type – Normal
9-Reliance Manual MMS Setting

  1.  Account Name – Smart MMS
  2.  Access point Name – MMS
  3.  Homepage – http://10.239.221.47/mms/
  4.  Proxy IP – 10.239.221.7
  5.  Port – 8080
  6.  Proxy - Yes

10-Manual Uninor GPRS Setting

sms ALL to 58355, to get automatic settings.(toll free)

  1.  Account Name – Uninor Gprs
  2.  Username – Blank
  3. Password – Blank
  4.  Homepage – http://www.google.com
  5.   Server Port – 8080
  6.   Server Address – 10.58.10.58
  7.   Data bearer – GPRS/Packet data
  8.   Access Point – uninor
  9.   Proxy – Yes
  10.   Authentication Type – Normal

11-Manual TATA DOCOMO GPRS Setting

To get Internet settings SMS  INTERNET  to 52270

  1. Account Name – TATA DOCOMO INTERNET
  2.  Username – Blank
  3.  Password – Blank
  4.  Homepage – http://tatadocomo.com
  5.  Server Port – 8080
  6.  Server Address – 10.124.94.7
  7. Data bearer – GPRS
  8.  Access Point Name – TATA.DOCOMO.INTERNET
  9.  Proxy – Yes
  10.  Authentication Type – Normal


12-Manual TATA DOCOMO MMS Setting

  1.  Account Name – TATA DOCOMO MMS
  2.  Data bearer – GPRS
  3.  APN – TATA.DOCOMO.MMS
  4.  Home page – http://mmsc/
  5. Proxy Server – 10.124.26.94
  6.  Proxy Port – 8799

NOTE:-If you face any Problem call customer care of tata docomo at 121, They will surely assist you.


12-Manual virgin Gprs Setting
To get Gprs setting SMS the word "SET" in uppercase to 738 
CCE number-
789 from your mobile, or 0845 6000 789
  1. Account Name-VBYTES
  2. APN-m.vbytes.in
  3. Proxy Server-10.124.94.8
  4. Port-8080
  5. Home Page-http://m.vbytes.in
  6. Password - Blank
  7. User name - Blank
  8. proxy - yes
  9. Authentication type- Normal

13- Manual S-Tel  Gprs  setting

To get gprs setting SMS ELIFE to 57777 (Toll Free)

The APN for pc connection-gprs.stel.in
Stel adda-

  1. -Account name-Stel Adda
  2. -APN-wap.stel.in
  3. -Proxy Address-10.11.8.5
  4. -Port-9401
  5. -Homepage-http://www.google.com
  6. Authentication Type-Normal
Stel ELIFE-
  1. -Account Name-Stel Elife
  2. APN-gprs.stel.in
  3. proxy Address-0.0.0.0
  4. Port-0
  5. Authentication Type- Normal


For more details call CCE to 1212






Tuesday, April 26, 2011

What Moles on your body parts means?


Moleosophy:-



























Significance of Twin Moles-
When there are twin moles irrespective of their location,the person possesses a dual nature. The presence of two moles, side by side, is indicative of a person being in love with two people.
Significance of shapes in Moles-
Round - A round mole signifies the goodness in people.
Oblong - An oblong mole depicts a modest share of acquired wealth.
Angular - An angular mole suggests that the individual has both positive and negative characteristics.
Significance of Moles based on color-
Light Colored Moles - Those who have light colored moles are considered lucky.
Black Moles - This denotes that a person would have to surmount obstacles in order to achieve the desired results.


Area Description
ArmsMoles on arms indicate that the person is polite, diligent and will lead a happy married life.If mole is near the elbow, the man will need to struggle in life, and might also become a young widower. If the woman has the same characteristics, however, her problems relate to her occupation.
ArmpitsA mole under the left arm is indicative of great struggle early in life, which is, however, well rewarded. Wealth makes later years equally pleasurable. A mole under the right arm shows that one needs to be alert and cautious in matters of security.
BackPeople like this are unreliable, and with them one must ensure that all facts are available before one enters any sort of negotiation for any enterprise.
Breast
(mole on breast)
A mole on the right breast is indicative of laziness, which may affect family life. You need to be assertive about your needs to be able to enjoy the love and comfort of the children. A mole on the left breast belongs to active and energetic people, who generally get what they want in life.
ButtocksPeople who have a mole on buttocks are un-ambitious, and will be reconciled to any mode of living.
CheekA mole on cheek (either cheek) indicates a serious and studious person who has no interest in material pleasures.
Chin
(mole on chin)
A mole on either side of the chin is indicative of people who are affectionate and caring. These people adapt easily to any situation. They love travelling and respect the law of the land. They are also dedicated and conscientious workers and willingly accept responsibilities.
EarPeople who are born with a mole on ear are generally considered lucky.
ElbowPeople who have moles on elbow love to travel. They are adventurous and spirited.
EyeIf the mole is located on the outer corner of the eye, this indicates that the person is honest, reliable and forthright.
EyebrowIf a mole is located on the right eyebrow, it signifies that these people will have a highly active life and will be successful in all ventures.
FingerPeople who have a mole on finger turn out to be dishonest and tend to grossly exaggerate.
FootPeople with a mole on foot are easy going and laid back. They need to exercise to stay healthy.
GenitalsMole on genitals lead to sexual addiction.
Forehead People who have a mole on forehead will be prosperous and well settled in life.
HandThose people who have a mole on hand are talented and make a success of their lives.
HeelPeople who possess a mole on their heel make enemies easily and are prone to losing friends.
HipA mole on any part of the hip except the buttocks signifies that these people are contented, resilient and spirited.
KneeIf you have a mole on right knee, it implies that you are a friendly person. A mole on left knee signifies that these people lead an extravagant lifestyle.
LipsPeople with a mole on lips always aspire to get ahead in life.
NavelA man who has a mole on navel will be lucky in life and a woman who has the same desires children.
NeckIf the mole is on the front of the neck, it signifies unexpected good fortune. If it is on either side of the neck, it indicates an unreasonable temperament. A mole on the back of the neck indicates a person's desire to lead a simple life.
NippleIf a man has a mole on nipple, it indicates a fickle nature. If a woman has a mole on nipple, it indicates that she is striving for social status.
NoseA mole on nose belongs to a person who will be a sincere friend and a hard-working individual.
ShoulderA mole on right shoulder indicates a sensible, industrious individual.
WristA mole on wrist indicates that the person is frugal, ingenious and dependable.

Thursday, April 21, 2011

Turn Your Desktop Into a Real 3D Multi-Touch Desktop

Download BumpTop (Windows) (13.6 MB – Free Version) 
BumpTop 3D desktop Turn Your Desktop Into a Real 3D Multi Touch Desktop

The way a Window desktop behaves, has not been changed since thirteen years. 
It’s all the same, rough and rigid icons lying dumbly at the cold desktop. 
Now is the time you can give your desktop a little extra. Bring your desktop to real 
3 Dimensional life like Arrange icons in a pile or groups. It takes just a few clicks or
 Your finger movements to do with all the data at your desktop to arrange it in the
 Way you want it in a real 3D environment.
Bump Top is a fun, intuitive 3D desktop that keeps you organized and makes
You more productive. Like a real desk, but better. Now with awesome mouse 
And multi-touch gestures, you will experience your desktop as never before. 
Your desktop doesn’t have to be a boring graveyard for lost and forgotten files anymore!
Transform it with Bump Top. Create the desktop that suits your needs and style. 


Desktop 3D Enhancement


Download BumpTop


Download BumpTop (Windows) (13.6 MB – Free Version)

Wednesday, April 06, 2011

Software Development Life Cycle(SDLC) & All models

Software Development Life Cycle(SDLC)

Definition:-A frame-work that describe the activities performed at each stage of a software development project, It is a logical systematic process used to develop software and information systems through planning, analysis, design, implementation and support. It is an approach that allow for System development to be a lot simplified and easy, less rigid and achieve Stability.
There are five Phases to the software Development life cycle:-
1)      Planning
2)      Analysis
3)      Design
4)      Implementation
5)      Maintenance

S.D.L.C
  1. Planning- The initial phase starts by defining the need. The purpose of the planning phase is to identify clearly the nature and scope of the business opportunity or problem by performing a preliminary investigation. This entails investigating their current system and what they hope to have in the future.
  2. Analysis- In the analysis phase we get further information about what they want and build more in-depth models of what they can expect to achieve with their new system. Requirement for the software are documented and reviewed with the customer.
  3. Design- when the project really starts to take form, We Engineers plan out all the inputs, outputs, interfaces, processes for the project and create the system design specification from this data. The requirements  translated into representation of the Software that can be assessed for quality before coding begins.
  1. Implementation-There are three stage of implementation a)coding : In this process design translated into a machine-readable form & if design is performed in a detailed manner, code generation can be accomplished mechanistically. b)testing : After coding team will make a prototype model to ensure that System will meet the needs of customer. c)Installation : Then after everyone Satisfied that the System is ready they will install the product and convert it into customer existing format.
  2. Maintenance-It refers to the support phase of software development. In this final phase, the team maintains the system and updates it as necessary to keep up to date with its environment. It focuses on change associated with error correction, changes due to enhancements brought about by changing customer requirements.
SDLC Model:-
Definition:-An abstract representation of a process describe the activities performed at each stage of a software development project .
Ø  Waterfall Model
Ø  RAD Model
Ø  Iterative Development Model
Ø  The Incremental Development Model
Ø  Spiral Model
Ø  The Parallel or Concurrent Development Model
Waterfall Model:-
Definition:-This Model also called Linear sequential Development Model, this model suggest a systematic Sequentially approach to Software development that begins at the System level and progress through analysis, design, coding ,testing , and support .It has a lock step fashion, where a stage cannot begin unless the preceding stage is completed.
v  Analysis- Defines needed information, function, behavior, performance and interfaces.
v  Design- Data structures, software architecture, interface representations, procedural details.
v  Implementation- Code generation, database, user documentation, testing.
q  NOTE-In waterfall model after all phases Documentation done.
Benefits-
    Easy to understand, easy to use.
    Appropriate for small Software.
    Provide lots of documentation for each phase which is very important for future.
    Important for those system where each phases is considered as discrete phase.
    Good for management control (plan, staff, track).
    Works well when quality is more important than cost or schedule.
    Milestone are well understood.
    Sets requirement stability.
Limitation-
    Not appropriate for large Software.
    Requires lots of documentation which is time consuming.
    When any changes need than we have to go to initial phase.
    Deliverables created for each phase are considered frozen – inhibits flexibility.
    Can give a false impression of progress
    Does not reflect problem-solving nature of software development – iterations of phases
    Integration is one big bang at the end.
    Little opportunity for customer to preview the system (until it may be too late).
RAD Model:-
v  Definition- Rapid Application Development (RAD) is  a software development methodology. It is a development lifecycle  designed to give much faster development  and higher-quality results than those achieved with the traditional lifecycle. It is designed to take the maximum advantage of powerful development software that has evolved recently.”
  • The RAD approach encompasses the following phases:-
Ø  Business Modeling
Ø  Data modeling
Ø  Process Modeling
Ø  Application Generation
Ø  Testing & Turnover
RAD approaches following phases:
Business model-Here we try to find answer to question like what information is generated? Who generate it? Etc.
Data modeling-It is a method used to define and analyze data requirements needed to support the business processes of an organization.
Process modeling- Process models are processes of the same nature that are classified together into a model.
Application generation-A series of occasional musings on architecting, securing, optimizing and generating web based applications.
Testing & Turnover-Many of the program components have already been tested so this reduce overall testing time.
Benefits:-
    Due to factors like iterative development more client satisfaction. Clients are involved from beginning to end.
    If done right you work out more initial requirement bugs before installation.
    You reduce the moving target syndrome.
    Focalizing data into one view instead of many screens.
    RAD's usual focus is on high return developments. Usually related to the financial sectors of the business. In my experience 10-1 payback in first year is easily obtainable.
    Reusable  objects make future developments  even faster.
    Time boxing really allows us to focus on deliverable components.
Drawbacks:-
    Not all types of application are appropriate for RAD.
    If the system cannot be properly modularize, building the component necessary for RAD will be problematic.
    RAD is not appropriate when technical risk are high.
    It is like college development projects. we would produce something that performed the required functions, looked good, but usually was not the best quality. Due to time constraints we submit what we have accomplished and take credit.
    The client usually gets a shell of what they want with several sections to be added in future projects(if we get to them).
    Initial project requirements are usually under estimated.
    Client expectations go through the roof. Suddenly they can't wait six months. Even though before RAD  we told them two years or more.
Iterative Development Model:-
Definition:-Iterative development is at the heart of a cyclic software development process developed in response to the weaknesses of the waterfall model. It starts with an initial planning and ends with deployment with the cyclic interactions in between.
Benefits:-
    Advantage of this approach is that it can result in better testing because testing each increment is likely to be easier than testing the entire system as in waterfall model.
    The increment model provide feedback to the client.
    It is useful for determining the final requirement of the System.
    This project control list gives an idea of how far the project is at any given step from the final System.
 At each step, extensions and design modifications can be made.
    Useful for testing the system within the development in starting.
Drawbacks:-
    In a customized software development, where the client has to essentially provide and approve the specifications, it is not always clear how this process can be applied.
    Practical problem with this type of development project, comes in generating the business contract-how will the cost of additional feature be determined and negotiated.
    In the latter steps, the design would have stabilized and there is less chances to redesign.
The Incremental Developmental Model:-
  Definition:-A software development technique in which requirement definition, design, implementation, and testing occur in an overlapping, iterative manner, resulting in incremental completion of the overall software product.
Benefits:-
       Early increment can be implemented with fewer people.
       Develop high-risk or major functions first.
       Each release delivers an operational product .
       Customer can respond to each build.
       Uses  “divide and conquer” breakdown of tasks.
       Lowers initial delivery cost .
       Initial product delivery is faster.
       Risk of changing requirements is reduced.
Drawbacks:-
       A major system might require the availability of new hardware.
       Requires good planning and design
       Requires early definition of a complete and fully functional system to allow for the definition of increments
       Well-defined module interfaces are required (some will be developed long before others)
       Total cost of the complete system is not lower

Spiral Model:-
Definition:-The spiral model is a software development process combining elements of both design and prototyping-in-stages, in an effort to combine advantages of top-down and bottom-up concepts. This model couples the iterative nature of the prototyping with the control and Systematic approach of linear model.
Benefits:-
       Provides early indication of insurmountable risks, without much cost
       Users see the system early because of rapid prototyping tools
       Critical high-risk functions are developed first
       The design does not have to be perfect
       Users can be closely tied to all lifecycle steps
       Early and frequent feedback from users
       Cumulative costs assessed frequently
Limitation:-
       Time spent for evaluating risks too large for small or low-risk projects
       Time spent planning, resetting objectives, doing risk analysis and prototyping may  be excessive
       The model is complex
       Risk assessment expertise is required
       Spiral may continue indefinitely
       Developers must be reassigned during non-development phase activities
       May be hard to define objective, verifiable milestones that indicate readiness to proceed through the next iteration
The parallel or Concurrent Development Model:-
Definition:-The concurrent process model defines a series of event that will trigger transition from state to state for each of the software engineering activities. This model is used for designing and developing of client server application.
   
Component based Development Model:-
This model compose application from prepackage software component called class. Classes created in past s/w project are stored in a class library and the s/w development is done on the basis of reusability by reusing the class from class libraries. The component based development model leads to software reuse, and reusability provides software engineers with a number of measurable benefits although it is very much dependent on the robustness of the component library.