tag:blogger.com,1999:blog-12394881300659635522024-03-16T12:38:32.894+05:30Free PC Tricks, E-Books, Magazines Download, Windows Tweaks, TutorialsSharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.comBlogger141125tag:blogger.com,1999:blog-1239488130065963552.post-62706536164179627262012-01-13T17:19:00.000+05:302012-01-13T17:19:44.924+05:30Reliance 4-Gen Tablet at Just 3500 INR<div dir="ltr" style="text-align: left;" trbidi="on">Mukesh Ambani's Reliance Industries plans to offer high speed data services on attractively priced tablets by 2012-end, which will coincide with the worldwide deployment of an advanced technology that it plans to use, two people familiar with the development told ET.<br />
<br />
The company had earlier planned to launch services by mid next year on data cards that could be plugged into computers and laptops. The RIL services is based on fourth generation, or 4G, technology which offers faster internet access compared to third generation (3G) services. RIL plans to launch tablets at around Rs 3,500 and bundle it with data offering as low as 1 GB at Rs 10, a tenth of the current 3G prices.<br />
<br />
RIL's entry and price disruption could therefore nullify the business case for 3G for existing mobile operators, all of whom on an average offer 1 GB of downloads for Rs 100 at present. Analysts also add that the immediate threat posed by RIL's entry will be to operators like Sistema Shyam and Tata Teleservices, the largest players in the dongle business, plug-in devices that provide wireless connectivity to the internet.<br />
<br />
An industry expert who asked not to be named said: "Frankly I am quite surprised that none of these companies is treating RIL's launch as a threat at the moment. I would think it is time to start gearing up for it. I don't see any of them doing anything." RIL is the only company to have pan-India spectrum to offer wireless broadband services on the 4G technology platform having paid Rs 13,000 crore for these airwaves.<br />
It will be launching services based on Qualcomm's long term evolution, or LTE, technology, which is currently in test phase. Global majors like Vodafone, Verizon and Telenor have deployed LTE networks in some developed markets. While subsidising devices will be main pillar of RIL's upcoming 4G mobile services offerings, the company is also analysing lessons from its previous foray into mobility. India's largest private sector company had launched mobile services in 2003, before the group was split between brothers Mukesh and Anil Ambani. At the time, it offered mobile handsets at an initial payment of Rs 501.<br />
<br />
In 2006, after Anil Ambani took charge of the telecom unit of the divided Reliance group, the operator struggled with unpaid bills and wrote of nearly Rs 4,500 crore primarily on account of the discount scheme.<br />
<br />
The RIL management is still working on structures that will avoid defaults of a similar nature, said one person.<br />
<br />
The company said its broadband offerings were still in the planning phase and no dates had been finalised.<br />
"Infotel Broadband Services is currently in the process of actively evaluating various technologies that will form a part of its pan-India rollout. At this stage, we have neither finalised a date for launching the services, nor the various types of services and associated tariff plans that we would offer at launch," the company spokesman said in an e-mail statement. "It is our intention to make all of our offerings device agnostic, and our services will be supported by a wide variety of devices from multiple vendors.<br />
<br />
We will, at appropriate times, make announcements about our plans," Reliance Industries spokesperson said. Currently the cheapest tablets in the market are between Rs 12,000 and Rs 13,000, including one of Reliance Communications at Rs 12,999, which it plans to bring down by 50% by late next year as volumes increase. Tablets and smartphones spur increases in data consumption and these services are billed at a premium giving some relief to operators hit by falling profit margins due to hyper competition in the voice calling space.<br />
<br />
source: <a href="http://articles.economictimes.indiatimes.com/2011-12-06/news/30481876_1_ril-plans-ril-management-tariff-plans" target="_blank">Economic Times</a> </div>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com2tag:blogger.com,1999:blog-1239488130065963552.post-38320731434952766102012-01-13T17:14:00.001+05:302012-01-13T17:15:56.330+05:30Send Free SMS Without Registration or Login<div dir="ltr" style="text-align: left;" trbidi="on">Now You can Send SMS to anyone in India without registration.<br />
<br />
On the occasion of New Year 2012, many of us want to send sms without following the long term registration process. <br />
<br />
You can send SMS upto 160 character in anywhere in India. Delivery is instant but fast enough as compared to paid mobile services.<br />
<br />
Click on this link to send free SMS without registering your mobile anywhere <a href="http://smsti.in/send-free-sms/">http://smsti.in/send-free-sms/</a><br />
<br />
Here you need to put the mobile number of those whom you want to send sms. Write your message and click on send button. You SMS will be delivered very quickly.</div>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com21tag:blogger.com,1999:blog-1239488130065963552.post-38236827389273580862011-07-22T11:28:00.000+05:302011-07-22T11:28:10.863+05:30Cyber Crime Complaints And Resolution Assistance Center [CCC-RAC]<div dir="ltr" style="text-align: left;" trbidi="on"><div style="text-align: left;"><span class="659351805-11022005"><div align="justify"><span style="font-family: Verdana;"><b><span style="font-size: medium;">CCC-RAC </span></b><span style="font-family: Times,"Times New Roman",serif; font-size: small;">is a public information and assistance service dedicated to the assistance of Cyber Crime Victims in India.</span></span></div><div align="justify" style="font-family: Times,"Times New Roman",serif;"><br />
</div><div align="justify" style="font-family: Times,"Times New Roman",serif;"><span style="font-size: small;">The Cyber crime resolution infrastructure in India is still in a nascent stage and inadequate. As a result, whenever a Cyber Crime occurs, the victim is at a loss to understand where he should seek relief.</span></div><div align="justify" style="font-family: Times,"Times New Roman",serif;"><span style="font-size: small;">This center is a public service division of Naavi.org and aims at providing guidance to the victims of what they are expected to do when they observe a crime against them.</span></div><div align="justify" style="font-family: Times,"Times New Roman",serif;"><br />
</div><div align="justify" style="font-family: Times,"Times New Roman",serif;"><span style="font-size: small;">CCC-RAC will function from Bangalore and maintain a group of accredited legal advisors who will provide litigation assistance to the victims.</span></div><div align="justify" style="font-family: Times,"Times New Roman",serif;"><br />
</div><div align="justify" style="font-family: Times,"Times New Roman",serif;"><span style="font-size: small;">Interested parties may utilize the mediation and arbitration services offered by <a href="http://www.arbitration.in/">www.arbitration.in</a> for resolving their disputes as per applicable provisions of law. Such services can be used only if both parties to the dispute agree on the use of the facilities.</span></div><div align="justify" style="font-family: Times,"Times New Roman",serif;"><br />
</div><div align="justify" style="font-family: Times,"Times New Roman",serif;"><span style="font-size: small;">For more information on Naavi and activities of Naavi.org, check <a href="http://www.naavi.org/">www.naavi.org</a> </span></div><div align="justify"><span style="font-family: Verdana;"> </span></div></span><span style="font-family: Verdana;"><u><b><span style="font-size: x-small;"><br />
</span></b></u></span></div><div style="text-align: left;"><span style="font-family: Verdana;"><u><b><span style="font-size: x-small;">[Before Lodging Your Complaint check if you need the services of <a href="http://www.ceac.in/">www.ceac.in</a> <a href="http://www.ceac4india.com/" target="_blank"> </a>for archiving the evidence on which you are basing your complaint. For some useful information on procedural aspects of a Criminal Case, refer this <a href="http://www.naavi.org/cl_editorial_05/faq_crimes.htm">FAQ</a>]</span></b></u></span></div><div align="justify"><span style="font-family: Verdana;"><u><span style="font-size: x-small;"><b>Following are the contact details of some of the Cyber Crime Police Stations set up by different States. Victims in the respective jurisdiction may contact them based on the "Location". </b> </span></u></span></div><div align="justify"><br />
</div><div align="justify"><span style="font-family: Verdana;"><u><span style="font-size: x-small;"><b>For example, a victim in Madurai should contact Cyber Crime Cell, CB CID, Chennai while a victim in Chennai City needs to contact the Cyber Crime Cell at Egmore. </b></span></u></span></div><div align="justify"><span style="font-family: Verdana;"><u><span style="font-size: x-small;"><b>The names of the officers in charge is as per information available at present and may not be correct. Your complaint can be made by designation. </b></span></u></span></div><div align="justify"><br />
</div><div align="justify"><span style="font-family: Verdana;"><u><span style="font-size: x-small;"><b>These officers are not in anyway connected with this information center.</b></span></u></span></div><div align="justify"><br />
</div><div align="justify"><span style="font-family: Verdana;"><u><span style="font-size: x-small;"><b>If you donot find a Cyber Crime Police Station in your location, you may lodge the complaint in the Police Station nearest to their residence or contact the SP in the area.</b></span></u></span></div><div align="justify"><span style="font-family: Verdana;"><u><span style="font-size: x-small;"><b>CCC_RAC will only provide legal assistance through its associate members where available. </b></span></u></span></div><div align="justify"><br />
</div><div align="center"> <span style="font-family: Verdana;"> </span><center> <span style="font-family: Verdana;"> </span><table border="1" cellpadding="5" cellspacing="5" id="AutoNumber3" style="border-collapse: collapse; width: 683px;"><tbody>
<tr> <td align="center" width="83"><b><span style="font-size: x-small;">Location</span></b></td> <td align="center" width="61"><b><span style="font-size: x-small;">Officer In Charge</span></b></td> <td align="center" width="93"><b><span style="font-size: x-small;">Address</span></b></td> <td align="center" width="139"><b><span style="font-size: x-small;">Telephone No</span></b></td> <td align="center" width="225"><b><span style="font-size: x-small;">E-mail</span></b></td> </tr>
<tr> <td width="83"><b><span style="font-size: x-small;">Chennai</span></b></td> <td width="61"><span style="font-size: x-small;">Dr Sudhakar</span></td> <td width="93"> <span style="font-size: x-small;">Assistant Comissioner of Police <br />
Cyber Crime Cell <br />
Commissioner office Campus <br />
Egmore, Chennai- 600008 </span> </td><td width="139"><span style="font-size: x-small;">044-23452350<br />
</span></td> <td width="225"> <a href="mailto:cyberac@rediffmail.com"> <span style="font-size: x-small;">cyberac@rediffmail.com</span></a><span style="font-size: x-small;"> </span> </td> </tr>
<tr> <td width="83"><b><span style="font-size: x-small;">Chennai for Rest of Tamil Nadu</span></b></td> <td width="61"><span style="font-size: x-small;">ACP</span></td> <td width="93"><span style="font-family: Times New Roman; font-size: x-small;">Cyber Crime Cell</span> <span class="Apple-style-span" style="border-collapse: separate; color: #333366; font-family: Verdana; font-size: 11px; font-style: normal; font-variant: normal; font-weight: bold; letter-spacing: normal; line-height: 20px; orphans: 2; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"> No:3, SIDCO Electronic Complex, I Floor, Guindy, Chennai - 32.</span><br />
<span style="font-family: Times New Roman; font-size: x-small;">CB, CID</span><br />
<span style="font-family: Times New Roman; font-size: x-small;">Chennai</span><br />
<span style="font-family: Times New Roman; font-size: x-small;"> Address Complaints to : ADGP, CBCID<br />
</span> <span style="font-family: Verdana;"> </span></td> <td width="139"><span style="font-size: x-small;"> <br />
Off:ADGP-CB CID 044-22509229/22502501</span><span style="font-size: x-small;"> DIG CBCID: 044 22502503</span><br />
<span style="font-size: x-small;">Control Room: 044 22502510</span></td> <td width="225"><span style="font-family: Arial; font-size: x-small;"><a href="mailto:cbcyber@tn.nic.in">cbcyber@tn.nic.in</a></span> <span style="font-family: Arial; font-size: x-small;"> <a href="http://66.102.7.104/search?q=cache:MA4ndgFMgsYJ:www.cbcid.tn.gov.in/CCC.htm+chennai+police+hacking&hl=en"> Notification</a></span></td> </tr>
<tr> <td width="83"><b><span style="font-size: x-small;">Bangalore for the Whole of Karnataka</span></b></td> <td width="61"><span style="font-size: x-small;">-</span></td> <td width="93"><span style="font-family: Times New Roman; font-size: x-small;">Cyber Crime Police Station<br />
C.O.D Headquarters,<br />
Carlton House, <br />
# 1, Palace Road,<br />
Bangalore - 560 001</span></td> <td width="139"><span style="color: #993300; font-family: Times New Roman; font-size: x-small;">080-22201026 <br />
080-22943050</span><span style="font-family: Verdana;"><span style="color: #993300; font-family: Times New Roman; font-size: x-small;"> 080-22387611 (FAX)</span></span><br />
<span style="font-family: Verdana;"> <span class="Apple-style-span" style="border-collapse: separate; color: black; font-family: Times New Roman; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"> Toll-free telephone number for filing petitions is :100 or </span></span><br />
<span style="font-family: Verdana;"> <span class="Apple-style-span" style="border-collapse: separate; color: black; font-family: Times New Roman; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"> 1-800-4250-100.</span></span></td> <td width="225"><a href="mailto:ccps@kar.nic.in"> <span style="color: #000099; font-family: Times New Roman; font-size: x-small;">ccps@kar.nic.in</span></a> <span style="color: #000099; font-family: Times New Roman; font-size: x-small;"> <a href="mailto:ccps@blr.vsnl.net.in">ccps@blr.vsnl.net.in</a> </span><br />
<span style="color: #000099; font-family: Times New Roman; font-size: x-small;"> <a href="http://www.cyberpolicebangalore.nic.in/">http://www.cyberpolicebangalore.nic.in/</a></span><br />
<span style="font-family: Times New Roman; font-size: x-small;"> <a href="http://www.ksp.gov.in/">http://www.ksp.gov.in</a> (Police website where complaints can be lodged online)</span><br />
<span style="font-family: Times New Roman; font-size: x-small;"> <a href="http://www.crimestoppersindia.org/">http://www.crimestoppersindia.org</a></span><br />
<span style="font-family: Times New Roman; font-size: x-small;"> (NGO site where public can notify crimes)</span><br />
<span style="font-family: Verdana;"> <span style="font-family: Times New Roman; font-size: x-small;"> <a href="http://www.ccc-rac.in/naavi_org_SB/cl_editorial_04/karnataka_police.htm">List of e-mail addresses of all Senior Police officers in Karnataka</a> : </span></span> <span style="font-family: Times New Roman; font-size: x-small;">(P.S: Some mail addresses may be incorrect)</span></td> </tr>
<tr> <td width="83"><b><span style="font-size: x-small;">Hyderabad</span></b></td> <td width="61"><span style="font-size: x-small;">-</span></td> <td width="93"> <div align="left"><strong style="font-weight: 400;"><span style="font-size: x-small;">Crime Investigation Department, 3rd Floor, D.G.P. Office, Lakdikapool, Hyderabad-500004</span></strong></div></td> <td width="139"><strong style="font-weight: 400;"><span style="font-size: x-small;"> 040-23240663, 040-27852274</span></strong> <strong style="font-weight: 400;"><span style="font-size: x-small;">040- 23297474 (Fax)</span></strong></td> <td width="225"><a href="mailto:cidap@cidap.gov.in"><span style="font-size: x-small;">cidap@cidap.gov.in</span></a> <a href="mailto:info@cidap.gov.in"><span style="font-size: x-small;">info@cidap.gov.in</span></a><br />
<span style="font-family: Times New Roman; font-size: x-small;"> <a href="http://www.cidap.gov.in/cybercrimes.aspx"> http://www.cidap.gov.in/cybercrimes.aspx</a> </span></td> </tr>
<tr> <td width="83"><b><span style="font-size: x-small;">Mumbai</span></b></td> <td width="61"><span style="font-size: x-small;">-</span></td> <td width="93"> <div align="left"> <span class="normaltext"><span style="font-size: x-small;">Cyber Crime Investigation Cell (Crime Branch, C.I.D), Annex-III Building, Police Commissioner Office, Crowford Market, Mumbai</span></span></div></td> <td width="139"><span style="font-size: x-small;"> <br />
</span> <span class="normaltext"><span style="font-size: x-small;">022-22641261</span></span></td> <td width="225"><span style="font-size: small;"><a href="mailto:officer@cybercellmumbai.com">officer@cybercellmumbai.com</a></span><span style="font-size: small;"> </span> <span style="font-family: Times New Roman; font-size: small;"> <a href="http://www.cybercellmumbai.com/">http://www.cybercellmumbai.com/</a> </span></td> </tr>
<tr> <td width="83"><b><span style="font-size: x-small;">Lucknow</span></b></td> <td width="61"> </td> <td width="93"> <span class="normaltext"><span style="font-size: x-small;">Cyber Crime Investigation Cell</span></span></td> <td width="139"> </td> <td width="225"> </td> </tr>
<tr> <td width="83"><b><span style="font-size: x-small;">Trivandrum</span></b></td> <td width="61"> </td> <td width="93"> <span class="normaltext"><span style="font-size: x-small;">Cyber Crime Reporting Center</span></span></td> <td width="139"><span style="font-size: x-small;">Call center</span><span style="font-size: x-small;">(0471) 2727004</span></td> <td width="225"><span style="font-size: small;"><a href="http://www.cyberkeralam.in/">www.cyberkeralam.in</a></span> <span style="font-size: small;"><a href="http://keralapolice.org/newsite/ccps.html"> http://keralapolice.org/newsite/ccps.html</a></span></td> </tr>
<tr> <td width="83"><span style="font-size: x-small;"><b>Thane</b></span></td> <td width="61"> </td> <td width="93"> <span class="Apple-style-span" style="border-collapse: separate; color: black; font-family: 'Times New Roman'; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"> <span class="Apple-style-span" style="font-family: Georgia,Times,'Times New Roman',serif; font-size: 15px; line-height: 22px;"> 3rd Floor, Police Commissioner Office<br />
Near Court Naka, Thane West,<br />
Thane 400601.</span></span></td> <td width="139"> <span class="Apple-style-span" style="border-collapse: separate; color: black; font-family: 'Times New Roman'; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"> <span class="Apple-style-span" style="font-family: Georgia,Times,'Times New Roman',serif; font-size: 15px; line-height: 22px;"> 022-25424444</span></span></td> <td width="225"> <span class="Apple-style-span" style="border-collapse: separate; color: black; font-family: 'Times New Roman'; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"> <span class="Apple-style-span" style="font-family: Georgia,Times,'Times New Roman',serif; font-size: 15px; line-height: 22px;"> www.thanepolice.org<br />
E-Mail: <a href="mailto:police@thanepolice.org">police@thanepolice.org</a></span></span></td> </tr>
<tr> <td width="83"><span style="font-size: x-small;"><b>Pune</b></span></td> <td width="61"> </td> <td width="93"> <span class="Apple-style-span" style="border-collapse: separate; color: black; font-family: 'Times New Roman'; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"> <span class="Apple-style-span" style="font-family: Georgia,Times,'Times New Roman',serif; font-size: 15px; line-height: 22px;"> Assistant Commissioner of Police<br />
Cyber Crime Investigation Cell<br />
Police Commissioner Office of Pune<br />
2, Sadhu Vaswani Road, Camp,<br />
Pune 411001</span></span></td> <td width="139"> <span class="Apple-style-span" style="border-collapse: separate; color: black; font-family: 'Times New Roman'; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"> <span class="Apple-style-span" style="font-family: Georgia,Times,'Times New Roman',serif; font-size: 15px; line-height: 22px;"> 020-2612 7277<br />
020-2616 5396<br />
020-2612 8105 (Fax)</span></span></td> <td width="225"> <span class="Apple-style-span" style="border-collapse: separate; color: black; font-family: 'Times New Roman'; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"> <span class="Apple-style-span" style="font-family: Georgia,Times,'Times New Roman',serif; font-size: 15px; line-height: 22px;"> Web site: <a href="http://punepolice.com/crime%20branch.html">http://punepolice.com/crime branch.html</a><br />
E-Mail: <a href="mailto:punepolice@vsnl.com">punepolice@vsnl.com</a></span></span></td> </tr>
<tr> <td width="83"> </td> <td width="61"> </td> <td width="93"> <span class="Apple-style-span" style="border-collapse: separate; color: black; font-family: 'Times New Roman'; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"> <span class="Apple-style-span" style="font-family: Georgia,Times,'Times New Roman',serif; font-size: 15px; line-height: 22px;"> <strong style="font-size: 15px; font-weight: bold; margin: 0px; outline-style: none; padding: 0px; text-decoration: none; vertical-align: baseline;"> Gujarat</strong><br />
DIG, CID, Crime and Railways<br />
Fifth Floor<br />
Police Bhavan<br />
Sector 18, Gandhinagar 382 018</span></span></td> <td width="139"> <span class="Apple-style-span" style="border-collapse: separate; color: black; font-family: 'Times New Roman'; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"> <span class="Apple-style-span" style="font-family: Georgia,Times,'Times New Roman',serif; font-size: 15px; line-height: 22px;"> 079-2325 4384<br />
+91-79-2325 3917 (FAX)</span></span></td> <td width="225"> </td> </tr>
<tr> <td width="83"><span style="font-size: x-small;"><b>Delhi</b></span></td> <td width="61"> </td> <td width="93"> <span class="Apple-style-span" style="border-collapse: separate; color: black; font-family: 'Times New Roman'; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"> <span class="Apple-style-span" style="font-family: Georgia,Times,'Times New Roman',serif; font-size: 15px; line-height: 22px;"> CBI Cyber Crime Cell:<br />
Superintendent of Police,<br />
Cyber Crime Investigation Cell<br />
Central Bureau of Investigation,<br />
5th Floor, Block No.3, CGO Complex,<br />
Lodhi Road, New Delhi – 3</span></span></td> <td width="139"> <span class="Apple-style-span" style="border-collapse: separate; color: black; font-family: 'Times New Roman'; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"> <span class="Apple-style-span" style="font-family: Georgia,Times,'Times New Roman',serif; font-size: 15px; line-height: 22px;"> 011-4362203<br />
011-4392424</span></span></td> <td width="225"> </td> </tr>
</tbody></table></center> </div><hr /> <span style="font-family: Times New Roman;"> </span><div align="left"> <span style="font-family: Times New Roman;"><b> </b></span></div><div align="left"><span style="font-family: Times New Roman;"><b>Address of CBI Cyber Crime Cell</b></span></div><div align="justify"> <span style="font-family: Times New Roman;">Supdt. of Police, Cyber Crime Investigation Cell Central Bureau of Investigation, 5th Floor, Block , No.3, CGO Complex, Lodhi Road, New Delhi - 3, Phone: 4362203, 4392424 : EMail: <a href="mailto:cbiccic@bol.net.in"> cbiccic@bol.net.in</a> : Web: <a href="http://cbi.nic.in/">http://cbi.nic.in/</a> </span> </div><hr /> <div align="center"><b><span style="font-family: Times New Roman;"></span></b></div><div align="center"><b><span style="font-family: Times New Roman;">Contact Address of Yahoo Mail and Hotmail Representative offices in India having responsibility as service providers for any Cyber Crime committed in India under ITA-2000 or other Laws.</span></b></div><span style="font-family: Arial Unicode MS; font-size: x-small;"> </span><div align="left"> <span style="font-family: Arial Unicode MS; font-size: x-small;"><b> </b></span></div><div align="left"><span style="font-family: Arial Unicode MS; font-size: x-small;"><b>Address of Yahoo India office: </b> </span> <span style="font-family: Times New Roman;"> </span></div><div align="left"> <span style="font-family: Times New Roman;">Yahoo Web Services India Private Limited, 386 Veer Savarkar Marg, Opposite Siddhivinayak temple, Mumbai 400 025, 22 56622222, 22 56622244.e-mail: <a href="mailto:ad-sales-india@yahoo-inc.com">ad-sales-india@yahoo-inc.com</a></span></div><div align="justify"> <span style="font-family: Times New Roman;"> </span></div><div align="justify"><span style="font-family: Times New Roman;">Yahoo also has an R & D center in Bangalore at the following address: </span> </div><div align="justify">Yahoo! Software Development India Pvt. Ltd. 4th floor, "Esquire Center", #9, M.G. Road, Bangalore - 560 001. Phone: +91 80 6694 9494, Fax: +91 80 6694 9595</div><div align="left"> <span style="font-family: Verdana;"><span style="font-family: Times New Roman;"> </span></span></div><div align="left"><span style="font-family: Verdana;"><span style="font-family: Times New Roman;">Any complaint regarding abuse of yahoo mail can be filed through this web page: <span style="font-family: Arial; font-size: large;"><span class="Apple-style-span" style="border-collapse: separate; color: black; font: 12px 'Lucida Grande'; letter-spacing: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: pre; widows: 2; word-spacing: 0px;"><br />
<span style="font-size: small;"><b><a href="http://help.yahoo.com/l/us/yahoo/mail/yahoomail/abuse.html"><br />
</a></b><a href="http://help.yahoo.com/l/us/yahoo/mail/yahoomail/abuse.html">http://help.yahoo.com/l/us/yahoo/mail/yahoomail/abuse.html</a></span></span></span></span></span></div><div align="left"> <span style="font-family: Verdana;"><span style="font-family: Times New Roman;"><b> </b></span></span></div><div align="left"><span style="font-family: Verdana;"><span style="font-family: Times New Roman;"><b>Address of MSN India Office: </b> </span> <span style="font-family: Arial Unicode MS;"> </span></span></div><div align="left"> <span style="font-family: Verdana;"><span style="font-family: Arial Unicode MS;"><span style="color: black; font-family: Times New Roman;">MSN India, Prestige Takt, 23 Kasturba Gandhi Cross,Bangalore – 560 001, eMail: <a href="mailto:msnadin@microsoft.com">msnadin@microsoft.com</a>, Tel: 91-80-2121212</span></span></span></div><div align="left"> <span style="font-family: Times New Roman;"><b> </b></span></div><div align="left"><span style="font-family: Times New Roman;"><b>E-Mail Addresses of different Cyber Crime Cells in Kerala</b></span></div><div align="left"> <span style="font-family: Times New Roman;"> <span class="Apple-style-span" style="border-collapse: separate; color: black; font-family: 'Times New Roman'; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span class="Apple-style-span" style="color: #333333; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 12px; text-align: left;"><table align="center" bgcolor="#f7f7f7" border="1" cellpadding="0" cellspacing="0" style="margin: 0px; padding: 0px;"><colgroup> <col style="margin: 0px; padding: 0px;" width="43"></col> <col style="margin: 0px; padding: 0px;" width="172"></col> <col style="margin: 0px; padding: 0px;" width="400"></col> </colgroup> <tbody style="margin: 0px; padding: 0px;">
<tr height="25" style="margin: 0px; padding: 0px;"> <td bgcolor="#6cb0d5" height="25" style="margin: 0px; padding: 0px;" width="51"> <div align="center" class="style3 style1 style2" style="color: white; font-weight: bold; margin: 0px; padding: 0px;"> <div align="center" style="margin: 0px; padding: 0px;"> <span class="style10" style="margin: 0px; padding: 0px;"> Sl.No.</span></div></div></td> <td bgcolor="#6cb0d5" style="margin: 0px; padding: 0px;" width="221"> <div align="center" class="style1" style="color: white; margin: 0px; padding: 0px;"> <strong style="margin: 0px; padding: 0px;"> <span class="style10" style="margin: 0px; padding: 0px;"> Designation</span></strong></div></td> <td bgcolor="#6cb0d5" style="margin: 0px; padding: 0px;" width="320"> <div align="center" class="style1" style="color: white; margin: 0px; padding: 0px;"> <strong style="margin: 0px; padding: 0px;"> <span class="style10" style="margin: 0px; padding: 0px;"> Email ID</span></strong></div></td> </tr>
<tr height="33" style="margin: 0px; padding: 0px;"> <td height="33" style="margin: 0px; padding: 0px;"> <div align="center" style="margin: 0px; padding: 0px;"> 1</div></td> <td style="margin: 0px; padding: 0px;"> Trivandrum city</td> <td style="margin: 0px; padding: 0px;"> <a href="mailto:cybercelltvmcity@keralapolice.gov.in" style="color: #4892e3; margin: 0px; padding: 0px; text-decoration: underline;"> cybercelltvmcity@keralapolice.gov.in</a></td> </tr>
<tr height="33" style="margin: 0px; padding: 0px;"> <td height="33" style="margin: 0px; padding: 0px;"> <div align="center" style="margin: 0px; padding: 0px;"> 2</div></td> <td style="margin: 0px; padding: 0px;"> Trivandrum rural</td> <td style="margin: 0px; padding: 0px;"> <a href="mailto:cybercelltvmrl@keralapolice.gov.in" style="color: #4892e3; margin: 0px; padding: 0px; text-decoration: underline;"> cybercelltvmrl@keralapolice.gov.in</a></td> </tr>
<tr height="33" style="margin: 0px; padding: 0px;"> <td height="33" style="margin: 0px; padding: 0px;"> <div align="center" style="margin: 0px; padding: 0px;"> 3</div></td> <td style="margin: 0px; padding: 0px;"> Kollam</td> <td style="margin: 0px; padding: 0px;"> <a href="mailto:cybercellklm@keralapolice.gov.in" style="color: #4892e3; margin: 0px; padding: 0px; text-decoration: underline;"> cybercellklm@keralapolice.gov.in</a></td> </tr>
<tr height="33" style="margin: 0px; padding: 0px;"> <td height="33" style="margin: 0px; padding: 0px;"> <div align="center" style="margin: 0px; padding: 0px;"> 4</div></td> <td style="margin: 0px; padding: 0px;"> Pathanamthitta</td> <td style="margin: 0px; padding: 0px;"> <a href="mailto:cybercellpta@keralapolice.gov.in" style="color: #4892e3; margin: 0px; padding: 0px; text-decoration: underline;"> cybercellpta@keralapolice.gov.in</a></td> </tr>
<tr height="33" style="margin: 0px; padding: 0px;"> <td height="33" style="margin: 0px; padding: 0px;"> <div align="center" style="margin: 0px; padding: 0px;"> 5</div></td> <td style="margin: 0px; padding: 0px;"> Alappuzha</td> <td style="margin: 0px; padding: 0px;"> <a href="mailto:cybercellalpy@keralapolice.gov.in" style="color: #4892e3; margin: 0px; padding: 0px; text-decoration: underline;"> cybercellalpy@keralapolice.gov.in</a></td> </tr>
<tr height="33" style="margin: 0px; padding: 0px;"> <td height="33" style="margin: 0px; padding: 0px;"> <div align="center" style="margin: 0px; padding: 0px;"> 6</div></td> <td style="margin: 0px; padding: 0px;"> Kottayam</td> <td style="margin: 0px; padding: 0px;"> <a href="mailto:cybercellktm@keralapolice.gov.in" style="color: #4892e3; margin: 0px; padding: 0px; text-decoration: underline;"> cybercellktm@keralapolice.gov.in</a></td> </tr>
<tr height="33" style="margin: 0px; padding: 0px;"> <td height="33" style="margin: 0px; padding: 0px;"> <div align="center" style="margin: 0px; padding: 0px;"> 7</div></td> <td style="margin: 0px; padding: 0px;"> Idukki</td> <td style="margin: 0px; padding: 0px;"> <a href="mailto:cybercellidk@keralapolice.gov.in" style="color: #4892e3; margin: 0px; padding: 0px; text-decoration: underline;"> cybercellidk@keralapolice.gov.in</a></td> </tr>
<tr height="33" style="margin: 0px; padding: 0px;"> <td height="33" style="margin: 0px; padding: 0px;"> <div align="center" style="margin: 0px; padding: 0px;"> 8</div></td> <td style="margin: 0px; padding: 0px;"> Eranakulam City</td> <td style="margin: 0px; padding: 0px;"> <a href="mailto:cybercellekm@keralapolice.gov.in" style="color: #4892e3; margin: 0px; padding: 0px; text-decoration: underline;"> cybercellekmcity@keralapolice.gov.in</a></td> </tr>
<tr height="33" style="margin: 0px; padding: 0px;"> <td height="33" style="margin: 0px; padding: 0px;"> <div align="center" style="margin: 0px; padding: 0px;"> 9</div></td> <td style="margin: 0px; padding: 0px;"> Eranakulam rural</td> <td style="margin: 0px; padding: 0px;"> <a href="mailto:cybercellekmrl@keralapolice.gov.in" style="color: #4892e3; margin: 0px; padding: 0px; text-decoration: underline;"> cybercellekmrl@keralapolice.gov.in</a></td> </tr>
<tr height="33" style="margin: 0px; padding: 0px;"> <td height="33" style="margin: 0px; padding: 0px;"> <div align="center" style="margin: 0px; padding: 0px;"> 10</div></td> <td style="margin: 0px; padding: 0px;"> Thrissure</td> <td style="margin: 0px; padding: 0px;"> <a href="mailto:cybercellekm@keralapolice.gov.in" style="color: #4892e3; margin: 0px; padding: 0px; text-decoration: underline;"> cybercelltsr@keralapolice.gov.in</a></td> </tr>
<tr height="33" style="margin: 0px; padding: 0px;"> <td height="33" style="margin: 0px; padding: 0px;"> <div align="center" style="margin: 0px; padding: 0px;"> 11</div></td> <td style="margin: 0px; padding: 0px;"> Palakkad</td> <td style="margin: 0px; padding: 0px;"> <a href="mailto:cybercellpkd@keralapolice.gov.in" style="color: #4892e3; margin: 0px; padding: 0px; text-decoration: underline;"> cybercellpkd@keralapolice.gov.in</a></td> </tr>
<tr height="33" style="margin: 0px; padding: 0px;"> <td height="33" style="margin: 0px; padding: 0px;"> <div align="center" style="margin: 0px; padding: 0px;"> 12</div></td> <td style="margin: 0px; padding: 0px;"> Malappuram</td> <td style="margin: 0px; padding: 0px;"> <a href="mailto:cybercellmpm@keralapolice.gov.in" style="color: #4892e3; margin: 0px; padding: 0px; text-decoration: underline;"> cybercellmpm@keralapolice.gov.in</a></td> </tr>
<tr height="33" style="margin: 0px; padding: 0px;"> <td height="33" style="margin: 0px; padding: 0px;"> <div align="center" style="margin: 0px; padding: 0px;"> 13</div></td> <td style="margin: 0px; padding: 0px;"> Kozhikkode City</td> <td style="margin: 0px; padding: 0px;"> <a href="mailto:cybercellkkd@keralapolice.gov.in" style="color: #4892e3; margin: 0px; padding: 0px; text-decoration: underline;"> cybercellkkdcity@keralapolice.gov.in</a></td> </tr>
<tr height="33" style="margin: 0px; padding: 0px;"> <td height="33" style="margin: 0px; padding: 0px;"> <div align="center" style="margin: 0px; padding: 0px;"> 14</div></td> <td style="margin: 0px; padding: 0px;"> Kozhikkode Rural</td> <td style="margin: 0px; padding: 0px;"> <a href="mailto:cybercellkkdrl@keralapolice.gov.in" style="color: #4892e3; margin: 0px; padding: 0px; text-decoration: underline;"> cybercellkkdrl@keralapolice.gov.in</a></td> </tr>
<tr height="33" style="margin: 0px; padding: 0px;"> <td height="33" style="margin: 0px; padding: 0px;"> <div align="center" style="margin: 0px; padding: 0px;"> 15</div></td> <td style="margin: 0px; padding: 0px;"> Wayanad</td> <td style="margin: 0px; padding: 0px;"> <a href="mailto:cybercellwynd@keralapolice.gov.in" style="color: #4892e3; margin: 0px; padding: 0px; text-decoration: underline;"> cybercellwynd@keralapolice.gov.in</a></td> </tr>
<tr height="33" style="margin: 0px; padding: 0px;"> <td height="33" style="margin: 0px; padding: 0px;"> <div align="center" style="margin: 0px; padding: 0px;"> 16</div></td> <td style="margin: 0px; padding: 0px;"> Kannur</td> <td style="margin: 0px; padding: 0px;"> <a href="mailto:cybercellknr@keralapolice.gov.in" style="color: #4892e3; margin: 0px; padding: 0px; text-decoration: underline;"> cybercellknr@keralapolice.gov.in</a></td> </tr>
<tr height="33" style="margin: 0px; padding: 0px;"> <td height="33" style="margin: 0px; padding: 0px;"> <div align="center" style="margin: 0px; padding: 0px;"> 17</div></td> <td style="margin: 0px; padding: 0px;"> Kasaragode</td> <td style="margin: 0px; padding: 0px;"> <a href="mailto:cybercellksd@keralapolice.gov.in" style="color: #4892e3; margin: 0px; padding: 0px; text-decoration: underline;"> cybercellksd@keralapolice.gov.in</a></td> </tr>
</tbody></table><br style="margin: 0px; padding: 0px;" /> </span></span></span></div><div align="left"> <span style="font-family: Verdana;"><div align="center"><b>[P.S: CCC-RAC is not a Police Station]</b></div><div align="center"><b> </b><b> </b></div></span></div><div style="text-align: left;"><div style="text-align: left;"><div style="text-align: left;">More Details: <a href="http://www.ccc-rac.in/index.html">http://www.ccc-rac.in/index.html</a></div><span style="font-family: Verdana;"><div align="center"><b> </b><b> </b></div></span></div><div style="text-align: left;"><br />
</div><div style="text-align: left;"><br />
</div></div><div style="text-align: left;"><div style="text-align: left;"><span style="font-family: Verdana;"><div align="center"><br />
</div></span></div></div></div>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com30tag:blogger.com,1999:blog-1239488130065963552.post-42301575733177357562011-07-22T11:04:00.000+05:302011-07-22T11:04:09.852+05:30THE INFORMATION TECHNOLOGY ACT, 2000<div dir="ltr" style="text-align: left;" trbidi="on"><div align="justify" class="mtext">Source: <a href="http://cybercrime.planetindia.net/it-act-2000.htm">planetindia.net</a></div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext">An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "Electronic Commerce", which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers' Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith or incidental thereto.</div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext"> WHEREAS the General Assembly of the United Nations by resolution A/RES/51/162, dated the 30th January, 1997 has adopted the Model Law on Electronic Commerce adopted by the United Nations Commission on International Trade Law;</div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext">AND WHEREAS the said resolution recommends, inter alia, that all States give favourable consideration to the said Model Law when they enact or revise their laws, in view of the need for uniformity of the law applicable to alternatives to paper-based methods of communication and storage of information; </div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext"> AND WHEREAS it is considered necessary to give effect to the said resolution and to promote efficient delivery of Government services by means of reliable electronic records; </div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext"> BE it enacted by Parliament in the Fifty-first Year of the Republic of India as follows:-</div><table border="0" cellpadding="5" cellspacing="1" class="mtext"><tbody>
<tr> <td align="left"><strong>CHAPTER 1 - PRELIMINARY </strong></td> </tr>
<tr> <td align="left" height="25"><a href="http://cybercrime.planetindia.net/ch1_1.htm">1) Short title, extent, commencement and application</a><br />
</td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch1_2.htm">2) Definitions</a></td> </tr>
<tr> <td align="left"> </td> </tr>
<tr> <td align="left"><strong>CHAPTER 2 - DIGITAL SIGNATURE</strong></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch2_3.htm">3) Authentication of electronic records</a>. </td> </tr>
<tr> <td align="left"> </td> </tr>
<tr> <td align="left"><strong>CHAPTER 3 - ELECTRONIC GOVERNANCE</strong></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch3_4.htm">4) Legal recognition of electronic records</a>.</td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch3_5.htm">5) Legal recognition of digital signatures</a>.</td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch3_6.htm">6) Use of electronic records and digital signatures in Government and its agencies</a>.</td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch3_7.htm">7) Retention of electronic records.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch3_8.htm">8) Publication of rules, regulation, etc., in Electronic Gazette.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch3_9.htm">9) Sections 6,7 and 8 not to confer right to insist document should be accepted in electronic form</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch3_10.htm">10) Power to make rules by Central Government in respect of digital signature</a></td> </tr>
<tr> <td align="left"> </td> </tr>
<tr> <td align="left"><strong>CHAPTER 4 - ATTRIBUTION, ACKNOWLEDGEMENT AND DESPATCH OF ELECTRONIC RECORDS</strong></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch4_11.htm">11) Attribution of electronic records.</a> </td> </tr>
<tr> <td align="left" height="3"><a href="http://cybercrime.planetindia.net/ch4_12.htm">12) Acknowledgement of receipt.</a> </td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch4_13.htm">13) Time and place of despatch and receipt of electronic record.</a></td> </tr>
<tr> <td align="left"> </td> </tr>
<tr> <td align="left"><strong>CHAPTER 5 - SECURE ELECTRONIC RECORDS AND SECURE DIGITAL SIGNATURES </strong></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch5_14.htm">14) Secure electronic record.</a><br />
</td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch5_15.htm">15) Secure digital signature.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch5_16.htm">16) Security procedure.</a></td> </tr>
<tr> <td align="left"> </td> </tr>
<tr> <td align="left"><strong>CHAPTER 6 - REGULATION OF CERTIFYING AUTHORITIES </strong></td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch6_17.htm">17) Appointment of Controller and other officers</a>. </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch6_18.htm">18) Functions of Controller.</a> </td> </tr>
<tr> <td align="left" height="24"> <a href="http://cybercrime.planetindia.net/ch6_19.htm">19) Recognition of foreign Certifying Authorities.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch6_20.htm">20) Controller to act as repository.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch6_21.htm">21) Licence to issue Digital Signature Certificates.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch6_22.htm">22) Application for licence.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch6_23.htm">23) Renewal of licence.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch6_24.htm">24) Procedure for grant or rejection of licence</a>. </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch6_25.htm">25) Suspension of licence.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch6_26.htm">26) Notice of suspension or revocation of licence</a>. </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch6_27.htm">27) Power to delegate.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch6_28.htm">28) Power to investigate contraventions.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch6_29.htm">29) Access to computers and data.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch6_30.htm">30) Certifying Authority to follow certain procedures</a>. </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch6_31.htm">31) Certifying Authority to ensure compliance of the Act, etc.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch6_32.htm">32) Display of licence</a>. </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch6_33.htm">33) Surrender of licence.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch6_34.htm">34) Disclosure.</a> </td> </tr>
<tr> <td align="left"> </td> </tr>
<tr> <td align="left"><strong>CHAPTER 7 - DIGITAL SIGNATURE CERTIFICATES</strong></td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch7_35.htm">35) Certifying Authority to issue Digital Signature Certificate.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch7_36.htm">36) Representations upon issuance of Digital Signature Certificate.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch7_37.htm">37) Suspension of Digital Signature Certificate.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch7_38.htm">38) Revocation of Digital Signature Certificate.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch7_39.htm">39) Notice of suspension or revocation.</a> </td> </tr>
<tr> <td align="left"> </td> </tr>
<tr> <td align="left"><strong>CHAPTER 8 - DUTIES OF SUBSCRIBERS</strong></td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch8_40.htm">40) Generating key pair.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch8_41.htm">41) Acceptance of Digital Signature Certificate.</a> </td> </tr>
<tr> <td align="left" height="24"> <a href="http://cybercrime.planetindia.net/ch8_42.htm">42) Control of private key.</a> </td> </tr>
<tr> <td align="left"> </td> </tr>
<tr> <td align="left"><strong>CHAPTER 9 - PENALTIES AND ADJUDICATION</strong></td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch9_43.htm">43) Penalty for damage to computer, computer system, etc.</a><br />
</td> </tr>
<tr> <td align="left" height="19"><a href="http://cybercrime.planetindia.net/ch9_44.htm">44) Penalty for failure to furnish information, return, etc. </a></td> </tr>
<tr> <td align="left" height="24"><a href="http://cybercrime.planetindia.net/ch9_45.htm">45) Residuary penalty.</a> </td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch9_46.htm">46) Power to adjudicate. </a></td> </tr>
<tr> <td align="left" height="31"><a href="http://cybercrime.planetindia.net/ch9_47.htm">47) Factors to be taken into account by the adjudicating officer.</a> </td> </tr>
<tr> <td align="left"> </td> </tr>
<tr> <td align="left"><strong>CHAPTER 10 - THE CYBER REGULATIONS APPELLATE TRIBUNAL</strong></td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch10_48.htm">48) Establishment of Cyber Appellate Tribunal.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch10_49.htm">49) Composition of Cyber Appellate Tribunal.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch10_50.htm">50) Qualifications for appointment as Presiding Officer of the Cyber Appellate Tribunal.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch10_51.htm">51) Term of office</a> </td> </tr>
<tr> <td align="left" height="26"> <a href="http://cybercrime.planetindia.net/ch10_52.htm">52) Salary, allowances and other terms and conditions of service of Presiding Officer.</a> </td> </tr>
<tr> <td align="left" height="18"> <a href="http://cybercrime.planetindia.net/ch10_53.htm">53) Filling up of vacancies</a>. </td> </tr>
<tr> <td align="left" height="14"> <a href="http://cybercrime.planetindia.net/ch10_54.htm">54) Resignation and removal</a>. </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch10_55.htm">55) Orders constituting Appellate Tribunal to be final and not to invalidate its proceedings.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch10_56.htm">56) Staff of the Cyber Appellate Tribunal.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch10_57.htm">57) Appeal to Cyber Regulations Appellate Tribunal.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch10_58.htm">58) Procedure and powers of the Cyber Appellate Tribunal.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch10_59.htm">59) Right to legal representation.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch10_60.htm">60) Limitation.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch10_61.htm">61) Civil court not to have jurisdiction.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch10_62.htm">62) Appeal to High Court.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch10_63.htm">63) Compounding of contraventions.</a> </td> </tr>
<tr> <td align="left"> <a href="http://cybercrime.planetindia.net/ch10_64.htm">64) Recovery of penalty</a> </td> </tr>
<tr> <td align="left"> </td> </tr>
<tr> <td align="left"><strong>CHAPTER 11 - OFFENCES</strong></td> </tr>
<tr> <td align="left" height="21"><a href="http://cybercrime.planetindia.net/ch11_65.htm">65) Tampering with computer source documents.</a> </td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch11_66.htm">66) Hacking with Computer System.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch11_67.htm">67) Publishing of information which is obscene in electronic form</a>. </td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch11_68.htm">68) Power of the Controller to give directions.</a> </td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch11_69.htm">69) Directions of Controller to a subscriber to extend facilities to decrypt information.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch11_70.htm">70) Protected system</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch11_71.htm">71) Penalty for misrepresentation.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch11_72.htm">72) Breach of confidentiality and privacy.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch11_73.htm">73) Penalty for publishing Digital Signature Certificate false in certain particulars.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch11_74.htm">74) Publication for fraudulent purpose.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch11_75.htm">75) Act to apply for offences or contravention committed outside India.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch11_76.htm">76) Confiscation.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch11_77.htm">77) Penalties and confiscation not to interfere with other punishments</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch11_78.htm">78) Power to investigate offences.</a></td> </tr>
<tr> <td align="left"> </td> </tr>
<tr> <td align="left"><strong>CHAPTER 12 - NETWORK SERVICE PROVIDERS NOT TO BE LIABLE IN CERTAIN CASES</strong></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch12_79.htm">79. Network service providers no to be liable in certain cases</a></td> </tr>
<tr> <td align="left"> </td> </tr>
<tr> <td align="left"><strong>CHAPTER 13 -MISCELLANEOUS</strong></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch13_80.htm">80) Power of police officer and other officers to enter, search, etc.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch13_81.htm">81) Act to have overriding effect.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch13_82.htm">82) Controller, Deputy Controller and Assistant Controllers to be public servants.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch13_83.htm">83) Power to give directions.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch13_84.htm">84) Protection of action taken in good faith.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch13_85.htm">85) Offences by Companies.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch13_86.htm">86) Removal of difficulties.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch13_87.htm">87) Power of Central Government to make rules.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch13_88.htm">88) Constitution of Advisory Committee.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch13_89.htm">89) Power of Controller to make regulations.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch13_90.htm">90) Power of State Government to make rules.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch13_91.htm">91) Amendment of Act 45 of 1860.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch13_92.htm">92) Amendment of Act 1 of 1872.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch13_93.htm">93) Amendment of Act 18 of 1891.</a></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/ch13_94.htm">94) Amendment of Act 2 of 1934.</a></td> </tr>
<tr> <td align="left"> </td> </tr>
<tr> <td align="left"><strong>THE FIRST SCHEDULE (See section 91)</strong></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/am1.htm">AMENDMENTS TO THE INDIAN PENAL CODE (45 OF 1860)</a></td> </tr>
<tr> <td align="left"> </td> </tr>
<tr> <td align="left"><strong>THE SECOND SCHEDULE (See section 92)</strong></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/am2.htm">AMENDMENTS TO THE INDIAN EVIDENCE ACT, 1872 (1 OF 1872)</a></td> </tr>
<tr> <td align="left"> </td> </tr>
<tr> <td align="left"><strong>THE THIRD SCHEDULE (See section 93)</strong></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/am3.htm">AMENDMENTS TO THE BANKERS' BOOKS EVIDENCE ACT 1891 (18 OF 1891)</a></td> </tr>
<tr> <td align="left"> </td> </tr>
<tr> <td align="left"><strong>THE FOURTH SCHEDULE(See section 94)</strong></td> </tr>
<tr> <td align="left"><a href="http://cybercrime.planetindia.net/am4.htm">AMENDMENT TO THE RESERVE BANK OF INDIA ACT, 1934 (2 OF 1934) </a></td></tr>
</tbody></table></div>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com1tag:blogger.com,1999:blog-1239488130065963552.post-9875304545241693122011-07-22T11:00:00.000+05:302011-07-22T11:00:21.806+05:30Frequently Used Cyber Crimes<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://cybercrime.planetindia.net/images/index_04.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="98" src="http://cybercrime.planetindia.net/images/index_04.jpg" width="400" /></a></div><strong> Unauthorized access to computer systems or networks</strong><br />
<div align="justify" class="mtext">This activity is commonly referred to as hacking. The Indian law has however given a different connotation to the term hacking, so we will not use the term "unauthorized access" interchangeably with the term "hacking".</div><div class="mtext"><br />
</div><div class="mtext"><strong>Theft of information contained in electronic form</strong></div><div align="justify" class="mtext">This includes information stored in computer hard disks, removable storage media etc.</div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext"><strong>Email bombing</strong></div><div align="justify" class="mtext">Email bombing refers to sending a large number of emails to the victim resulting in the victim's email account (in case of an individual) or mail servers (in case of a company or an email service provider) crashing. In one case, a foreigner who had been residing in Simla, India for almost thirty years wanted to avail of a scheme introduced by the Simla Housing Board to buy land at lower rates. When he made an application it was rejected on the grounds that the 169 schemes was available only for citizens of India. He decided to take his revenge. Consequently he sent thousands of mails to the Simla Housing Board and repeatedly kept sending e-mails till their servers crashed.</div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext"><strong>Data diddling</strong></div><div align="justify" class="mtext"> This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed. Electricity Boards in India have been victims to data diddling programs inserted when private parties were computerizing their systems.</div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext"><strong>Salami attacks</strong></div><div align="justify" class="mtext"> These attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. E.g. a bank employee inserts a program, into the bank's servers, that deducts a small amount of money (say Rs. 5 a month) from the account of every customer. No account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month. </div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext">To cite an example, an employee of a bank in USA was dismissed from his job. Disgruntled at having been supposedly mistreated by his employers the man first introduced a logic bomb into the bank's systems.</div><div align="justify" class="mtext">Logic bombs are programmes, which are activated on the occurrence of a particular predefined event. The logic bomb was programmed to take ten cents from all the accounts in the bank and put them into the account of the person whose name was alphabetically the last in the bank's rosters. Then he went and opened an account in the name of Ziegler. The amount being withdrawn from each of the accounts in the bank was so insignificant that neither any of the account holders nor the bank officials noticed the fault. </div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext">It was brought to their notice when a person by the name of Zygler opened his account in that bank. He was surprised to find a sizable amount of money being transferred into his account every Saturday.</div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext"><strong>Denial of Service attack</strong></div><div align="justify" class="mtext"> This involves flooding a computer resource with more requests than it can handle. This causes the resource (e.g. a web server) to crash thereby denying authorized users the service offered by the resource. Another variation to a typical denial of service attack is known as a Distributed Denial of Service (DDoS) attack wherein the perpetrators are many and are geographically widespread. It is very difficult to control such attacks. The attack is initiated by sending excessive demands to the victim's computer(s), exceeding the limit that the victim's servers can support and making the servers crash. Denial-of-service attacks have had an impressive history having, in the past, brought down websites like Amazon, CNN, Yahoo and eBay!</div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext"><strong>Virus / worm attacks</strong></div><div align="justify" class="mtext"> Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory. 170 The VBS_LOVELETTER virus (better known as the Love Bug or the ILOVEYOU virus) was reportedly written by a Filipino undergraduate.</div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext">In May 2000, this deadly virus beat the Melissa virus hollow - it became the world's most prevalent virus. It struck one in every five personal computers in the world. When the virus was brought under check the true magnitude of the losses was incomprehensible. Losses incurred during this virus attack were pegged at US $ 10 billion.</div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext">The original VBS_LOVELETTER utilized the addresses in Microsoft Outlook and emailed itself to those addresses. The e-mail, which was sent out, had "ILOVEYOU" in its subject line. The attachment file was named "LOVE-LETTER-FORYOU. TXT.vbs". The subject line and those who had some knowledge of viruses, did not notice the tiny .vbs extension and believed the file to be a text file conquered people wary of opening e-mail attachments. The message in the e-mail was "kindly check the attached LOVELETTER coming from me".</div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext">Since the initial outbreak over thirty variants of the virus have been developed many of them following the original by just a few weeks. In addition, the Love Bug also uses the Internet Relay Chat (IRC) for its propagation. It e-mails itself to users in the same channel as the infected user. Unlike the Melissa virus this virus does have a destructive effect. Whereas the Melissa, once installed, merely inserts some text into the affected documents at a particular instant during the day, VBS_LOVELETTER first selects certain files and then inserts its own code in lieu of the original data contained in the file. This way it creates ever-increasing versions of itself. Probably the world's most famous worm was the Internet worm let loose on the Internet by Robert Morris sometime in 1988. The Internet was, then, still in its developing years and this worm, which affected thousands of computers, almost brought its development to a complete halt. It took a team of experts almost three days to get rid of the worm and in the meantime many of the computers had to be disconnected from the network.</div><div align="justify" class="mtext"><br />
</div><strong>Logic bombs</strong><br />
<div align="justify" class="mtext">These are event dependent programs. This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs. E.g. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date (like the Chernobyl virus).</div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext"><strong>Trojan attacks</strong></div><div align="justify" class="mtext"> A Trojan as this program is aptly called, is an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing.</div><div align="justify" class="mtext">There are many simple ways of installing a Trojan in someone's computer. To cite and example, two friends Rahul and Mukesh (names changed), had a heated argument over one girl, Radha (name changed) whom they both liked. When the girl, asked to choose, chose Mukesh over Rahul, Rahul decided to get even. On the 14th of February, he sent Mukesh a spoofed e-card, which appeared to have come from Radha's mail account. The e-card actually contained a Trojan. As soon as Mukesh opened the card, the Trojan was installed on his computer. Rahul now had complete control over Mukesh's computer and proceeded to harass him thoroughly.</div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext"><strong>Internet time thefts</strong></div><div align="justify" class="mtext">This connotes the usage by an unauthorized person of the Internet hours paid for by another person. In a case reported before the enactment of the Information Technology Act, 2000 Colonel Bajwa, a resident of New Delhi, asked a nearby net café owner to come and set up his Internet connection. For this purpose, the net café owner needed to know his username and password. After having set up the connection he went away with knowing the present username and password. He then sold this information to another net café. One week later Colonel Bajwa found that his Internet hours were almost over. Out of the 100 hours that he had bought, 94 hours had been used up within the span of that week. Surprised, he reported the incident to the Delhi police. The police could not believe that time could be stolen. They were not aware of the concept of time-theft at all. Colonel Bajwa's report was rejected. He decided to approach The Times of India, New Delhi. They, in turn carried a report about the inadequacy of the New Delhi Police in handling cyber crimes. The Commissioner of Police, Delhi then took the case into his own hands and the police under his directions raided and arrested the net café owner under the charge of theft as defined by the Indian Penal Code. The net café owner spent several weeks locked up in Tihar jail before being granted bail.</div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext"><strong>Web jacking</strong> </div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext">This occurs when someone forcefully takes control of a website (by cracking the password and later changing it). The actual owner of the website does not have any more control over what appears on that website In a recent incident reported in the USA the owner of a hobby website for children received an e-mail informing her that a group of hackers had gained control over her website. They demanded a ransom of 1 million dollars from her. The owner, a schoolteacher, did not take the threat seriously. She felt that it was just a scare tactic and ignored the e-mail. It was three days later that she came to know, following many telephone calls from all over the country, that the hackers had web jacked her website. </div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext">Subsequently, they had altered a portion of the website which was entitled 'How to have fun with goldfish'. In all the places where it had been mentioned, they had replaced the word 'goldfish' with the word 'piranhas'. Piranhas are tiny but extremely dangerous flesh-eating fish. Many children had visited the popular website and had believed what the contents of the website suggested. These unfortunate children followed the instructions, tried to play with piranhas, which they bought from pet shops, and were very seriously injured!</div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext"><strong>Theft of computer system</strong></div><div align="justify" class="mtext"> This type of offence involves the theft of a computer, some part(s) of a computer or a peripheral attached to the computer.</div><div align="justify" class="mtext"><br />
</div><div align="justify" class="mtext"><strong>Physically damaging a computer system</strong></div><div align="justify" class="mtext"> This crime is committed by physically damaging a computer or its peripherals.</div><div align="justify" class="mtext"><strong> </strong></div><div align="justify" class="mtext"><br />
</div></div>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com0tag:blogger.com,1999:blog-1239488130065963552.post-49095012611909669372011-07-18T14:47:00.000+05:302011-07-18T14:47:44.832+05:3020 Facebook Hacks and Tips You Might Not Know<span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><span id="goog_291540087"></span><span id="goog_291540088"></span>If you surf Facebook on daily basis or occasionally, chances are you’re already familiar with regular stuffs like add/delete friends, update statuses, walls and profile, add and explore pages & applications, etc, but there’s more..</span><br />
<br />
<span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">This week we want to cover some interesting things you can do on (or with) Facebook; inclusive of tricks that are not documented or unknown to many, as well as tips to stay connected better with your friends. </span><br />
<br />
<span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">Without further ado, here’s <b>20 Facebook Tips/Tricks You Might Not Know</b></span><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">. </span><br />
<br />
<a href="http://www.blogger.com/post-edit.g?blogID=1239488130065963552&postID=4909501261190966937" name="more"></a><br />
<span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif; line-height: 16px;"> 1.</span><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif; font-weight: bold; line-height: 16px;">How to Place Facebook Chat On Firefox Sidebar</span><br />
<span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><span class="Apple-style-span"> <b style="line-height: 16px;"> </b></span></span><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">If you are using Firefox, you can place the Facebook Chat at the sidebar.</span><br />
<br />
<ol><li><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><img alt="Facebook_Chat_Firefox_Sidebar" height="281" src="http://www.hongki.at/images/facebook_tips/Facebook_Chat_Firefox_Sidebar.jpg" style="border-width: 0px;" width="500" /></span></li>
<li><h4 style="line-height: 1em;"><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">How to Download Facebook Photo Albums</span></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><a href="https://addons.mozilla.org/en-US/firefox/addon/8442" style="text-decoration: none;">FacePAD: Facebook Photo Album Downloader</a> allows you to download your friends’ facebook albums, Events albums, and Group Albums, en masse, with the click of a button.</span><br />
<a href="https://addons.mozilla.org/en-US/firefox/addon/8442" style="text-decoration: none;"><span class="Apple-style-span" style="color: black; font-family: Georgia,'Times New Roman',serif;"><img alt="facepad" height="497" src="http://www.hongki.at/images/facebook_tips/facepad.jpg" style="border-width: 0px;" width="500" /></span></a></li>
<li><h4 style="line-height: 1em;"><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">How to Share Flickr Photos to Facebook</span></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><a href="http://www.keebler.net/flickr2facebook/" style="text-decoration: none;">Flickr2Facebook</a> is an unofficial Flickr to Facebook uploader(bookmarklet) which allows you upload photos to Facebook from Flickr.</span><br />
<a href="http://www.keebler.net/flickr2facebook/" style="text-decoration: none;"><span class="Apple-style-span" style="color: black; font-family: Georgia,'Times New Roman',serif;"><img alt="flickr2facebook" height="305" src="http://www.hongki.at/images/facebook_tips/flickr2facebook.jpg" style="border-width: 0px;" width="500" /></span></a></li>
<li><h4 style="line-height: 1em;"><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">How to Update Facebook without Using Facebook</span></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><a href="http://hellotxt.com/" style="text-decoration: none;">hellotxt</a> and <a href="http://ping.fm/" style="text-decoration: none;">Ping.fm</a> both introduced features that let Facebook administrators update Facebook Pages.</span><br />
<span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><img alt="hellotxt" height="513" src="http://www.hongki.at/images/facebook_tips/hellotxt.jpg" width="500" /></span></li>
<li><h4 style="line-height: 1em;"><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">How to Schedule Facebook Messages</span></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><a href="http://sendible.com/" style="text-decoration: none;">Sendible</a> lets you schedule Facebook messages ahead of time so you can send messages to your friends, customers or colleagues in the future.</span><br />
<a href="http://sendible.com/" style="text-decoration: none;"><span class="Apple-style-span" style="color: black; font-family: Georgia,'Times New Roman',serif;"><img alt="sendible" height="311" src="http://www.hongki.at/images/facebook_tips/sendible.jpg" style="border-width: 0px;" width="500" /></span></a></li>
<li><h4 style="line-height: 1em;"><a href="http://www.makeuseof.com/tag/facebook-tip-how-to-safely-friend-a-colleague-or-relative-without-showing-them-all-your-business/" style="text-decoration: none;"><span class="Apple-style-span" style="color: black; font-family: Georgia,'Times New Roman',serif;">How to "Friend" Someone on Facebook & Hide It From Your Status Updates</span></a></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">A short tutorial on <a href="http://www.makeuseof.com/" style="text-decoration: none;">Makeuseof</a> to guide you how to hide Facebook status updates and keep that fact confined to your closer friends.</span><br />
<a href="http://www.makeuseof.com/tag/facebook-tip-how-to-safely-friend-a-colleague-or-relative-without-showing-them-all-your-business/" style="text-decoration: none;"><span class="Apple-style-span" style="color: black; font-family: Georgia,'Times New Roman',serif;"><img height="614" src="http://www.hongki.at/images/facebook_tips/hide_status.jpg" style="border-width: 0px;" width="500" /></span></a></li>
<li><h4 style="line-height: 1em;"><a href="http://www.blogger.com/post-edit.g?blogID=4841385458593131271&postID=1002804898492381689&from=pencil"><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">How to Create a Photo Collage Using Pictures of Your Facebook Friends</span></a></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">Click on <b>Friends</b> tab. Proceed to <b>More</b> tab. From "<b>Choose an option</b>" dropdown, choose any of the dashes "<b>—</b>" . Your Facebook friends collage is right on your computer screen.</span><br />
<a href="http://www.blogger.com/post-edit.g?blogID=4841385458593131271&postID=1002804898492381689&from=pencil"><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><img alt="photo_collage" height="389" src="http://www.hongki.at/images/facebook_tips/photo_collage.jpg" style="border-width: 0px;" width="500" /></span></a></li>
<li><h4 style="line-height: 1em;"><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">How to Know When Facebook Friends Secretly Delete or Block You</span></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><a href="http://findxfriends.com/" style="text-decoration: none;">X-Friends</a> is a unique tool for tracking friends that disappear from Facebook.</span><br />
<a href="http://findxfriends.com/" style="text-decoration: none;"><span class="Apple-style-span" style="color: black; font-family: Georgia,'Times New Roman',serif;"><img alt="X-friends" src="http://www.hongki.at/images/facebook_tips/X-friends.jpg" style="border-width: 0px;" /></span></a></li>
<li><h4 style="line-height: 1em;"><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">How to Display Selected Pictures Only on your Facebook Profile Page</span></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">A little-known feature in Facebook that lets you decide who shows up in that Friends box. Click that "<b>edit</b>" pencil in your Friends box and <b>type the names</b> of your best friends in the box that says "<b>Always show these friends</b>"</span><br />
<span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><img alt="friend_photos" src="http://www.hongki.at/images/facebook_tips/friend_photos.jpg" /></span></li>
<li><h4 style="line-height: 1em;"><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">How to Remove Facebook Advertisements</span></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">This Greasemonkey script – <a href="http://userscripts.org/scripts/show/27121" style="text-decoration: none;">Facebook: Cleaner</a> removes many of the annoying ads and updates that unavoidably appear on your Facebook pages.</span><br />
<a href="http://userscripts.org/scripts/show/27121" style="text-decoration: none;"><span class="Apple-style-span" style="color: black; font-family: Georgia,'Times New Roman',serif;"><img alt="ads" src="http://www.hongki.at/images/facebook_tips/ads.jpg" style="border-width: 0px;" /></span></a></li>
<li><h4 style="line-height: 1em;"><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">How to Syncs Photos of Facebook Friends with Contacts in Microsoft Outlook</span></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><a href="http://www.melsam.com/outsync/" style="text-decoration: none;">OutSync</a> is a free Windows application that syncs photos of your Facebook friends with matching contacts in Microsoft Outlook. It allows you to select which contacts are updated. So you can update all contacts at once or just a few at a time.</span><br />
<a href="http://www.melsam.com/outsync/" style="text-decoration: none;"><span class="Apple-style-span" style="color: black; font-family: Georgia,'Times New Roman',serif;"><img alt="outsync" height="349" src="http://www.hongki.at/images/facebook_tips/outsync.jpg" style="border-width: 0px;" width="500" /></span></a></li>
<li><h4 style="line-height: 1em;"><a href="http://www.blogger.com/post-edit.g?blogID=4841385458593131271&postID=1002804898492381689&from=pencil"><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">How to Display Facebook Statuses on Wordpress Blog</span></a></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">The following method make use of Facebook status feed and Wordpress RSS widget to display Facebook Statuses on WordPress blog.. It will also work for self-host Wordpress blogs.</span><br />
<a href="http://www.blogger.com/post-edit.g?blogID=4841385458593131271&postID=1002804898492381689&from=pencil"><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><img alt="statuses" height="353" src="http://www.hongki.at/images/facebook_tips/statuses.jpg" style="border-width: 0px;" width="500" /></span></a></li>
<li><h4 style="line-height: 1em;"><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">How to Post Your Blog Posts to Your Facebook Wall Automatically</span></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><a href="http://wordpress.org/extend/plugins/wordbook/" style="text-decoration: none;">Wordbook</a> allows you to cross-post your blog posts to your Facebook Wall. Your Facebook “Boxes” tab will show your most recent blog posts.</span><br />
<a href="http://wordpress.org/extend/plugins/wordbook/" style="text-decoration: none;"><span class="Apple-style-span" style="color: black; font-family: Georgia,'Times New Roman',serif;"><img alt="wordbook" height="500" src="http://www.hongki.at/images/facebook_tips/wordbook.jpg" style="border-width: 0px;" width="500" /></span></a></li>
<li><h4 style="line-height: 1em;"><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">How to Access Facebook Chat on Desktop</span></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><a href="http://www.gabtastik.com/GabtastikWin.html" style="text-decoration: none;">Gabtastik</a> and <a href="http://www.digsby.com/" style="text-decoration: none;">digsby</a> let you keep Facebook chat sessions open on your Windows desktop outside of your regular web browser, using minimal screen real estate and system memory.</span><br />
<a href="http://www.gabtastik.com/GabtastikWin.html" style="text-decoration: none;"><span class="Apple-style-span" style="color: black; font-family: Georgia,'Times New Roman',serif;"><img height="480" src="http://www.hongki.at/images/facebook_tips/gabtastik.jpg" style="border-width: 0px;" width="500" /></span></a></li>
<li><h4 style="line-height: 1em;"><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">How to Create Quiz on Facebook Easily</span></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><a href="http://www.lolapps.com/" style="text-decoration: none;">LOLapps</a> provides quiz creator that can be employed to conjure up these popular personality quizzes that are so widespread in Facebook.</span><br />
<a href="http://www.lolapps.com/" style="text-decoration: none;"><span class="Apple-style-span" style="color: black; font-family: Georgia,'Times New Roman',serif;"><img alt="lolapps" height="347" src="http://www.hongki.at/images/facebook_tips/lolapps.jpg" style="border-width: 0px;" width="500" /></span></a></li>
<li><h4 style="line-height: 1em;"><a href="http://www.labnol.org/internet/hide-online-status-in-facebook-chat/8503/" style="text-decoration: none;"><span class="Apple-style-span" style="color: black; font-family: Georgia,'Times New Roman',serif;">How to Hide Your Online Status on Facebook Chat from Select Contacts</span></a></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">Facebook has integrated friends list with Chat and you can also choose which of these list members get to see you online.</span><br />
<a href="http://www.labnol.org/internet/hide-online-status-in-facebook-chat/8503/" style="text-decoration: none;"><span class="Apple-style-span" style="color: black; font-family: Georgia,'Times New Roman',serif;"><img alt="hide" src="http://www.hongki.at/images/facebook_tips/hide.jpg" style="border-width: 0px;" /></span></a></li>
<li><h4 style="line-height: 1em;"><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">How to Get Facebook Updates on Email</span></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><a href="http://nutshellmail.com/" style="text-decoration: none;">NutshellMail</a> consolidates your Facebook accounts through the inbox you use the most.</span><br />
<a href="http://nutshellmail.com/" style="text-decoration: none;"><span class="Apple-style-span" style="color: black; font-family: Georgia,'Times New Roman',serif;"><img alt="nutshellmail" height="340" src="http://www.hongki.at/images/facebook_tips/nutshellmail.jpg" style="border-width: 0px;" width="500" /></span></a></li>
<li><h4 style="line-height: 1em;"><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">How to Update Facebook Status from Firefox</span></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><a href="https://addons.mozilla.org/en-US/firefox/addon/8973" style="text-decoration: none;">FireStatus</a> is a status update utility for multiple social networks, including FaceBook.</span><br />
<a href="https://addons.mozilla.org/en-US/firefox/addon/8973" style="text-decoration: none;"><span class="Apple-style-span" style="color: black; font-family: Georgia,'Times New Roman',serif;"><img alt="firestatus" height="117" src="http://www.hongki.at/images/facebook_tips/firestatus.jpg" style="border-width: 0px;" width="500" /></span></a></li>
<li><h4 style="line-height: 1em;"><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">How to Get Facebook on Your Desktop</span></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><a href="http://desktop.seesmic.com/" style="text-decoration: none;">Seesmic Desktop</a>, <a href="http://www.widgets.yahoo.com/widgets/facebooker" style="text-decoration: none;">Facebooker</a>, <a href="http://www.xobni.com/" style="text-decoration: none;" target="_blank">Xobni</a>, <a href="http://www.facebooksidebargadget.com/" style="text-decoration: none;">Facebook Sidebar Gadget</a>, <a href="http://www.scrapboy.com/" style="text-decoration: none;">Scrapboy</a> and <a href="http://static.ak.fbcdn.net/fbair/Facebook_Desktop_for_AIR.zip" style="text-decoration: none;">Facebook AIR application</a> are desktop applications that allows you interact with your stream just as you would on Facebook, but without the browser.</span><br />
<span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><img height="291" src="http://www.hongki.at/images/facebook_tips/desktop_apps.jpg" width="500" /></span></li>
<li><h4 style="line-height: 1em;"><a href="http://www.mydigitallife.info/2007/11/04/delete-cancel-and-terminate-facebook-account-and-profile/" style="text-decoration: none;"><span class="Apple-style-span" style="color: black; font-family: Georgia,'Times New Roman',serif;">How to Delete, Cancel and Terminate Facebook Account and Profile</span></a></h4><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;">A simple guide to terminate, delete or cancel Facebook account, together with the Facebook profile easily.</span><br />
<a href="http://www.mydigitallife.info/2007/11/04/delete-cancel-and-terminate-facebook-account-and-profile/" style="text-decoration: none;"><span class="Apple-style-span" style="color: black; font-family: Georgia,'Times New Roman',serif;"><img alt="terminate" height="715" src="http://www.hongki.at/images/facebook_tips/terminate.jpg" style="border-width: 0px; height: 715px; width: 500px;" width="500" /></span></a></li>
</ol><span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"><br />
Source: <a href="http://hongkiat.com/">Hongkiat.com</a></span>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com112tag:blogger.com,1999:blog-1239488130065963552.post-32894045507418655552011-07-17T12:19:00.000+05:302011-07-17T12:19:52.020+05:30Get free mobile credit thru EmbeePay<h6 class="uiStreamMessage" data-ft="{"type":"msg"}" style="font-family: Georgia,"Times New Roman",serif; font-weight: normal;"><span style="font-size: small;"><span><span class="messageBody">EmbeePay is a facebook application for getting easyload on your mobile very easily. I got around 200 Rs in 2 days.Very easy to work out.<br />
<br />
<b>Follow these steps :</b><br />
<br />
** First<a href="http://www.embeemobile.com/fb/wallet/?invitedby=1620890960"> <b style="color: blue;">JOIN EMBEEPAY</b></a> & allow the application on facebook . </span></span></span></h6><h6 class="uiStreamMessage" data-ft="{"type":"msg"}" style="font-family: Georgia,"Times New Roman",serif; font-weight: normal;"><span style="font-size: small;"><span><span class="messageBody">** Now enter your phone number and get registered and you will get 100 points.<br />
** After that validate your account .You will get a code in 3-4 min ,enter it and get 50 more points.<br />
** Now subscribe to their mailing and get 5 points.<br />
** Now total you got is 155 points very easily.<br />
** After that go to earn and do different surveys and offers and earn points.I will recommend to do those surveys which are free ad give low points like fb app etc . There are lot of offers you can do.<br />
** Moreover suggest 5 friends and when they register you will get 10 points .</span></span></span></h6><h6 class="uiStreamMessage" data-ft="{"type":"msg"}" style="font-family: Georgia,"Times New Roman",serif; font-weight: normal;"><span style="font-size: small;"><span><span class="messageBody">When you reached to 300 points ,go to redeem and you will get easy load of Rs.100 Top Up.</span></span></span></h6>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com0tag:blogger.com,1999:blog-1239488130065963552.post-22365048107251641942011-07-16T09:47:00.000+05:302011-07-16T09:47:51.273+05:30John Walkenbach's Favorite Excel 2010 Tips and Tricks<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-jMPWZxSWPgTBkp1KDrWZeUjFMR-JFX2GYk9Cf2AF2rtfB66NjLD73PWc2BhuEBBP_s8vqdTnfqDJWPlHGnvnXgwgodZYp3m9zsCbvjdZtq2_reWEoZIts-WLbKVzck_mbmJrsD14yqg/s1600/7.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-jMPWZxSWPgTBkp1KDrWZeUjFMR-JFX2GYk9Cf2AF2rtfB66NjLD73PWc2BhuEBBP_s8vqdTnfqDJWPlHGnvnXgwgodZYp3m9zsCbvjdZtq2_reWEoZIts-WLbKVzck_mbmJrsD14yqg/s1600/7.jpeg" /></a></div><div style="text-align: center;"><b>John Walkenbach's Favorite Excel 2010 Tips and Tricks (Mr. Spreadsheet's Bookshelf)</b><br />
Wiley | 2010-07-13 | ISBN: 0470475374 | 504 pages | PDF | 6 MB</div><br />
<blockquote>Build robust Excel 2010 apps quickly and efficiently Known as "Mr. Spreadsheet," John Walkenbach's name is synonymous with excellence in computer books that explain the complexities of various topics. With this collection of favorite Excel tips and tricks, you get a unique look at ways to make Excel 2010 more efficient than you ever imagined.<br />
<br />
Packed with easy-to-understand advice regarding all aspects of Excel, this book shares improved ways of speeding up application development with Excel and maximizing the power of Excel to create robust applications.<br />
<br />
* Addresses the extensive changes to the 2010 version of Excel and shares tricks and shortcuts for making your Excel experience as successful and efficient as possible<br />
* Reveals ways to deal with function arguments, create "impossible" charts, and tame the Ribbon bar<br />
* Discusses absolute vs. relative references, change data entry orientation, and sort more than three columns<br />
* Demonstrates ways to enter fake data for testing purposes<br />
<br />
With John Walkenbach's Favorite Excel 2010 Tips and Tricks, you'll get a jump start on mastering the extensive changes to the 2010 version of Excel.<br />
<blockquote></blockquote></blockquote>Download:<br />
<a href="http://www.filesonic.com/file/79894724/0470475374.pdf">Filesonic</a> <br />
<blockquote><blockquote> </blockquote></blockquote>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com3tag:blogger.com,1999:blog-1239488130065963552.post-39240483372647426602011-07-16T09:42:00.000+05:302011-07-16T09:42:30.229+05:30101 Internet Businesses You Can Start from Home<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5QG1cU8bXcreEl7hNTMFqAaMrFaR2Nscs70bt2iVbheJlmLPGKk9UlGIesUduvJFSn3XG5oIBYHPX73evoIB84-VqJyA80aL3jGIP50tVr0FIuWA1WIIL5tbAhZJ1DziD59uWfdADeoB9/s1600/7.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5QG1cU8bXcreEl7hNTMFqAaMrFaR2Nscs70bt2iVbheJlmLPGKk9UlGIesUduvJFSn3XG5oIBYHPX73evoIB84-VqJyA80aL3jGIP50tVr0FIuWA1WIIL5tbAhZJ1DziD59uWfdADeoB9/s1600/7.jpeg" /></a></div><div style="text-align: center;"><span style="font-weight: bold;">101 Internet Businesses You Can Start from Home</span><br />
Publisher: Maximum Press | ISBN:188506859 | 2001 | 520 pages | PDF | 1.7 MB</div><br />
<blockquote>101 Internet Businesses You Can Start from Home written by Susan Sweeney - best selling author and Internet marketing expert, is for those who want to break away from rigid schedules, unappreciative bosses, and soul-sapping commutes. This book puts prospective Internet entrepreneurs on the road to success by offering an analysis of Internet mechanics and commerce and providing profiles of successful Internet businesses. Containing more than just technical information, this manual also helps the entrepreneur prioritize business goals and evaluate comfortable levels of risk, ensuring that the chosen business matches the aspirations of the entrepreneur. Each of the 101 business profiles includes promotion techniques for helping these start-ups get on the road to success, and a password for access to the companion website is provided.<br />
<blockquote></blockquote></blockquote>Download:<br />
<a href="http://www2.sharingmatrix.com/file/1819367/101_Internet_Businesses_You_Can_Start_from_Home.rar">Sharingmatrix</a><br />
Or<br />
<a href="http://rapidshare.com/files/292070834/101_Internet_Businesses_You_Can_Start_from_Home.rar" id="alive_link" title="Name: 101_Internet_Businesses_You_Can_Start_from_Home.rar
Size: 1.75 MB (1838651 bytes)">Rapidshare</a> <br />
<blockquote><blockquote> </blockquote></blockquote>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com0tag:blogger.com,1999:blog-1239488130065963552.post-23400122623134954832011-07-13T09:32:00.000+05:302011-07-13T09:32:36.164+05:305 Simple And Obvious Tips For Better CommunicationSome things we just know. Some things we learn by reading books and yet another set of things we learn the hard way: by doing them. Or, to be more precise, by trial and error. Or, to be even more precise, by a lot of trial and a lot of errors.<br />
<br />
<br />
For me, one of these things was interpersonal communication. I always had a very easy way with words. Seemed that I can find them without too much effort. Also, I have the ability to learn new languages pretty easy (I’m not a native English speaker, by the way). And that made me believe for a long time that I was a good communicator.<br />
<br />
Of course, I was so totally wrong. As paradoxical as it may seem, interpersonal communication has very little to do with words. It doesn’t really matter how fast or accurate you may find them. The very core of interpersonal communication is not in words, it’s in interaction. It’s true that sometimes words may greatly enhance this interaction, but the core is always about dancing, not about posing.<br />
<br />
So here are 5 simple rules that will help you get more value from your conversations. They’re not learned from any books, but from my own experience in countless of interpersonal communication processes.<br />
<h2>1. Never Start A Sentence If You Don’t Know How It Ends</h2>That was one of my biggest struggles when I started to consciously improve my interpersonal skills. There is this thrill of talking out of nothing, just to have your voice heard. I may say a stupid thing, but what the heck, at least I will make myself heard. What a dumb (and actually easy to avoid) mistake.<br />
The thin interest that you may generate will soon turn into laughter or just plain ignorance. Mean what you say and know exactly how it will turn out before putting it into words. While it looks like it may add some salt and pepper to the conversation by introducing some sort of randomness, speaking without really knowing what you say will only ruin the other part expectations. They’re talking to you because they’re searching for meaning, not for randomness.<br />
Now, every little thing I say is atomically processed in my head before it reaches my lips. It creates some sort of a mental space in which I can follow the main ideas or the further developments of the main conversation thread. If doing this sounds like too much of a hassle, don’t worry, it’s way much easier than you think. Just start practicing and it will come along naturally.<br />
<h2>2. “Uh”, “Oh” and “Sheesh” Are Vague</h2><h2> </h2>So expect to get back vague responses too. Interjections are not meant to generate an answer, but merely to acknowledge your surprise or satisfaction. If you use an “Oh” as a way to get an answer from somebody else, not only you will gradually puzzle your interlocutors, but, eventually, you will annoy the heck out of them.<br />
Being exact in your responses is fundamental in interpersonal communication. Imagine that you’re playing squash. You hit the ball and expect the wall to send it back exactly in the direction you calculate. Now imagine the wall is actually soft, or deformed, like being made from some sort of plastic. Your ball will fly around in unpredictable circles.<br />
That’s exactly what these types of interjections, which we all use because they’re holding some degree of “coolness”, are doing. They’re distorting the feedback we’re sending back to our interlocutor. In the end, he’ll walk out with a foggy conclusion about your interaction. If he’ll be able to extract a conclusion at all. Huh? ;)<br />
<h2>3. There’s No Right Or Wrong</h2>Noticed how often we continue a conversation just to prove that we’re right? I call that type of conversation a “loose end”. If somebody approaches me with something like “well, let me tell you how things really are in that matter”, I usually don’t. Don’t let that person tell me anything, that is.<br />
Being right or wrong is a mental construct. We’re moving through life continuously, our own personalities may change over time and we’re constantly changing contexts and situations. What’s right here today may change tomorrow and what’s acceptable as true in your culture may be completely forbidden in another one.<br />
Hijacking an entire conversation just to prove yourself right is an incredible waste of time. Human interaction is much more valuable than we’re ready to accept and much more rewarding, if carefully practiced. For instance, the benefits of proving yourself right will last as long as that conversation, while the benefits of a true interaction will widely go over that 10 minutes span, maybe for years.<br />
<h2>4. Listening Is Always More Valuable Than Talking</h2>If you spend more than 50% percent of a conversation just talking, you’re losing big time. Ideally, a conversation will have at least half of the time dedicated to listening. Because that’s where the real value lies, in finding out new things. One can really know just as much as he knows. Value is created incrementally, by incorporating other messages in your knowledge base.<br />
That’s why I developed my own listening technique. Every time I witness my interlocutor’s eyes slipping slightly over my head, I know it’s time to use that technique. By the way, listening doesn’t mean you shut up. On the contrary, you support conversation, you show you’re engaged and willing to learn more.<br />
Ask small questions, acknowledge that you’re processing the information, give small incentives to the other part so he’ll keep on talking. The art of listening is even more difficult than the art of talking, but, in my experience, its benefits are in direct proportion with the difficulty. Way bigger, that is.<br />
<h2>5. Login. Logout.</h2>Practice your openings and closings very carefully. When I enter a conversation, I usually do a mental “login”. Like I actually login on a remote server via some sort of a console (I’m a bit of a geek, I know, I can’t help it). Once I’m there, my activities are bound to that window. I almost never get out of that space until I finish what I was supposed to do there.<br />
This trick proved to be so valuable that I even used it in real life events like workshops or team buildings. The initial “ice breaking” sheet of paper is called “Login” and the feedback form I give them at the end is called “Logout”. It helps everybody identify and respect the boundaries of that specific event.<br />
The same happens in conversations. That’s why I seldom respond to an interruption stimulus if I’m engaged with somebody else. If I start 3 login sessions at once, I will never remember what command I issued, in what window. They will just stay there, on my screen, but without real use. Or, in other words, interpersonal clutter.<br />
<br />
Author : <b><span style="color: red;">Dragos Roua</span></b> is a serial online entrepreneur, personal development fanatic, blogger, father, dreamer, and risk taker. Maker of the <a href="http://iadd.co/">iAdd</a> iPhone / iPad app. One third of the <a href="http://wpsumo.com/">wordpress framework WPSumo</a>. Full time blogger at <a href="http://www.dragosroua.com/">DragosRoua.com</a>. Think happiness is a process, not a goal. <br />
<h2> </h2><h2> </h2>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com0tag:blogger.com,1999:blog-1239488130065963552.post-80058907383670980922011-07-13T09:12:00.000+05:302011-07-13T09:12:35.342+05:30[How To]Protect your Pen drive from autorun virusOne of the most challenging task now a days for naive computer users is to keep their usb drive free of autorun viruses. Most of the time when you connect your USB drive to any public computer chances are pretty high that an autorun virus gets loaded in your pen drive. So next time when you put it in your computer your computer will automatically get infected by the autorun virus.<br />
<br />
BitDefender has come up with a really useful tool named USB Immunizer. Bitdefender USB immunizer is designed to help protect windows users from autorun virus files. It creates an autorun.inf file which can not be modified or replaced by the malicious autorun files.<br />
<br />
<div></div><div class="separator" style="clear: both; text-align: center;"><a href="http://i1214.photobucket.com/albums/cc484/sharanforum/blog/usb-immunizer-300x237.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://i1214.photobucket.com/albums/cc484/sharanforum/blog/usb-immunizer-300x237.gif" /></a></div><br />
<br />
It also allows user to easily on /off the autorun feature in Windows operating systems. A user can easily turn off the autorun feature by dragging the slider to off in the main screen.<br />
<br />
Autorun immunizer can save you from a lot of hassels which can be caused by the autorun virus.This amazing app is free for everyone and can run on any of the latest Windows operating system. You can download it from the link given below.<br />
<h4>Download :<a href="http://labs.bitdefender.com/wp-content/uploads/2011/04/BDUSBImmunizer1.zip" rel="nofollow" target="_blank" title="Bitdefender Autorun immunizer"> BDUSBImmunizer1.zip (1.1 MB) </a></h4>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com0tag:blogger.com,1999:blog-1239488130065963552.post-73426583501159808682011-07-07T14:57:00.001+05:302011-07-07T18:05:20.163+05:30How to set up Video Chat in FacebookVideo chat facility on Facebook powered by Skype is now available to use. You can easily install and intergrate Facebook video chat option in your Facebook account.<br />
<br />
To do so, follow these simple steps given below:<br />
<ul><li>Go to this <b><a href="http://www.facebook.com/videocalling" target="_blank">URL</a></b>, and click on get started.</li>
</ul><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://i1214.photobucket.com/albums/cc484/sharanforum/07-Jul-11-12-28-37-AM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="201" src="http://i1214.photobucket.com/albums/cc484/sharanforum/07-Jul-11-12-28-37-AM.png" width="320" /></a></div><ul><li>Suddenly your Chat interface will be changed and it will prompt your to set up few things.</li>
<li>Now click on Cam symbol appearing on chat window of any of your friend.</li>
</ul><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://i1214.photobucket.com/albums/cc484/sharanforum/07-Jul-11-12-35-57-AM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://i1214.photobucket.com/albums/cc484/sharanforum/07-Jul-11-12-35-57-AM.png" /></a></div><ul><li>A notification will appear and guide you to download the facebookvideochat.exe plugin on your computer.</li>
</ul><div style="text-align: center;"></div><div style="float: none; margin: 10px 0pt; text-align: center;"></div><div style="text-align: left;"><div class="separator" style="clear: both; text-align: center;"><a href="http://i1214.photobucket.com/albums/cc484/sharanforum/06-Jul-11-11-41-42-PM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="146" src="http://i1214.photobucket.com/albums/cc484/sharanforum/06-Jul-11-11-41-42-PM.png" width="320" /></a></div><div class="separator" style="clear: both; text-align: center;"><a href="http://i1214.photobucket.com/albums/cc484/sharanforum/06-Jul-11-11-42-11-PM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="148" src="http://i1214.photobucket.com/albums/cc484/sharanforum/06-Jul-11-11-42-11-PM.png" width="320" /></a></div><br />
</div><ul><li>Now wait until the plugin will get installed. </li>
</ul><br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://i1214.photobucket.com/albums/cc484/sharanforum/06-Jul-11-11-44-21-PM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="106" src="http://i1214.photobucket.com/albums/cc484/sharanforum/06-Jul-11-11-44-21-PM.png" width="320" /></a></div><br />
<ul><li>And its all done now, click on the <b>Cam</b> symbol to make a video call.</li>
<li>Once your friend will answer the call, you will start seeing each other.</li>
</ul><br />
It’s all done! Now enjoy the video calling with your Facebook friends and family easily.Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com22tag:blogger.com,1999:blog-1239488130065963552.post-14177794258528355892011-07-07T14:36:00.000+05:302011-07-07T14:36:24.635+05:30Screensaver - Display CPU, RAM, Disk activity, top 5 process, Battery life<div class="separator" style="clear: both; text-align: center;"><a href="http://www.sdsoftware.org/images/19/usefulsaver.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://www.sdsoftware.org/images/19/usefulsaver.jpg" /></a></div> UsefulSaver displays CPU info, RAM info, disk activity, disk space, top 5 processes, battery life remaining, and how long the screensaver's been running.<br />
This screensaver also features the date and time, customizable quotes, and ScreenWash. ScreenWash is a feature that help prevent LCD burn-in. After the screensaver has been on for a specified time (10 minutes by default), the screen goes black, then displays the date and time in 4 different colors for 1 minute each.<br />
<br />
Then the normal screensaver resumes and the cycle continues. Lots of colors options available, as well as font selection and size. For computers with multiple screens, a photo viewer is available to make use of the space.<br />
<br />
<div align="center"><span class="caption">Click on an icon to begin your download:</span></div><div align="center"> </div><table border="1" cellpadding="10" cellspacing="0" style="border-collapse: collapse;"><tbody>
<tr> <td>Version 1.0: 32-bit</td> <td align="center">871 KB</td> <td align="center"><a href="http://www.sdsoftware.org/download.asp?id=1997&code=UsefulSaverSetup"><img alt="" border="0" height="33" src="http://www.sdsoftware.org/images/7/download.gif" width="33" /></a></td> </tr>
<tr> <td>Version 1.0: 64-bit</td> <td align="center">870 KB</td> <td align="center"><a href="http://www.sdsoftware.org/download.asp?id=1998&code=UsefulSaverSetup64"><img alt="" border="0" height="33" src="http://www.sdsoftware.org/images/7/download.gif" width="33" /></a></td></tr>
</tbody></table>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com5tag:blogger.com,1999:blog-1239488130065963552.post-86494864726657646132011-07-07T14:27:00.003+05:302011-07-21T10:59:16.118+05:30Add Gpedit.msc to Windows 7 Home & Starter Editions<div dir="ltr" style="text-align: left;" trbidi="on"><div style="text-align: justify;">The Group Policy Editor (Gpedit.msc) is one of the most useful tools for administering policy on Windows 7. While Windows 7 Ultimate, Professional and Enterprise editions have gpedit.msc, Unfortunately certain editions of Windows 7 like Home Premium, Home Basic and Starter Editions do not include the Group Policy Editor.<span id="more-29910"></span></div><div style="text-align: justify;">One of <span style="color: blue;">thewindowsclub</span> forum members <a href="http://forum.thewindowsclub.com/members/davehc.html" target="_blank"><b>davehc</b></a> has compiled a tool <b>Gpedit Installer</b> that allows you to add gpedit.msc to Windows versions that do not have it, like Windows 7 Home Premium, Home Basic and Starter Editions.</div><div style="text-align: justify;"><br />
</div>To do so, download the zip file, unzip its contents and run the installer as admin. This is how it will go:<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://i1214.photobucket.com/albums/cc484/sharanforum/blog/gpedit-1-400x305.jpg?t=1310492018" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="244" src="http://i1214.photobucket.com/albums/cc484/sharanforum/blog/gpedit-1-400x305.jpg?t=1310492018" width="320" /></a></div><div class="separator" style="clear: both; text-align: center;"><a href="http://i1214.photobucket.com/albums/cc484/sharanforum/blog/gpedit-2-400x314.jpg?t=1310492810" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="251" src="http://i1214.photobucket.com/albums/cc484/sharanforum/blog/gpedit-2-400x314.jpg?t=1310492810" width="320" /></a></div><div class="separator" style="clear: both; text-align: center;"><a href="http://i1214.photobucket.com/albums/cc484/sharanforum/blog/gpedit-3-400x314.jpg?t=1310493000" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="251" src="http://i1214.photobucket.com/albums/cc484/sharanforum/blog/gpedit-3-400x314.jpg?t=1310493000" width="320" /></a></div><div class="separator" style="clear: both; text-align: center;"><a href="http://i1214.photobucket.com/albums/cc484/sharanforum/blog/gpedit-4.jpg?t=1310493112" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="http://i1214.photobucket.com/albums/cc484/sharanforum/blog/gpedit-4.jpg?t=1310493112" width="320" /></a></div><div class="separator" style="clear: both; text-align: center;"><a href="http://i1214.photobucket.com/albums/cc484/sharanforum/blog/gpedit-5-400x312.jpg?t=1310493229" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="249" src="http://i1214.photobucket.com/albums/cc484/sharanforum/blog/gpedit-5-400x312.jpg?t=1310493229" width="320" /></a></div><br />
<div style="text-align: center;"></div><div style="text-align: justify;">At the end of the run, you will find that it will have add the Group Policy Editor to your Windows Home Premium, Home Basic or Starter Edition.</div><div style="text-align: center;"><a href="http://www.thewindowsclub.com/downloads/GPEI.zip">DOWNLOAD Installer</a> </div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><b><span style="color: blue;">Above Steps are enough for x32 bit systems.</span></b></div><div style="text-align: justify;"><br />
</div><div style="color: red; text-align: justify;"><b>Extra Step for x64 bit systems:</b></div><div style="text-align: justify;"><span style="color: blue;">After Installing the above installer - Download the zip file below and extract the gpecit.msc file to C:\Windows\System32 Folder manually</span></div><div style="text-align: center;"><a href="http://www.thewindowsclub.com/downloads/gpedit1.zip">Download File</a></div><div class="ezAdsense adsense adsense-midtext" style="margin: 12px; text-align: center;"></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">So if you plan to try it out, do let us know how it goes. Best to always <span style="text-decoration: underline;">create a system restore point first</span> before making any changes to your system.</div><div style="text-align: justify;">source:<a href="http://www.thewindowsclub.com/">thewindowsclub.com </a></div></div>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com23tag:blogger.com,1999:blog-1239488130065963552.post-77816478036710884032011-07-07T13:57:00.001+05:302011-07-12T23:29:55.849+05:30Google blocks all CO.CC sites from its search results<div style="text-align: justify;">Google has taken its fight against spammy sites to the next level. It has decided to stop indexing all co.cc websites.<span id="more-30232"></span></div><div style="text-align: center;"><a href="http://i1214.photobucket.com/albums/cc484/sharanforum/blog/site-co-cc.jpg?t=1310493469" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://i1214.photobucket.com/albums/cc484/sharanforum/blog/site-co-cc.jpg?t=1310493469" /></a> </div><div style="text-align: justify;">This move on the part of Google has affected over 11 million sites, who have been removed from Google’s index, and that is quite a large number. <i>It appears that a significant number of websites using this domain were spammy or shady websites.</i> But unfortunately those who were running genuine websites have also been affected by this blanket decision. Try <a href="http://www.google.com/search?q=site:co.cc" rel="nofollow" target="_blank">searching for co.cc </a>sites and see.</div><div class="ezAdsense adsense adsense-midtext" style="margin: 12px; text-align: center;"></div><div style="text-align: justify;">Says <a href="https://plus.google.com/u/1/109412257237874861202/posts/eanXpZKMDSf#109412257237874861202/posts/eanXpZKMDSf" rel="nofollow" target="_blank">Matt Cutts of Google</a>:</div><blockquote><div style="text-align: justify;">We absolutely do try to be granular, but I wanted to mention that if we see a very large fraction of sites on a specific freehost be spammy or low-quality, we do reserve the right to take action on the freehost as a whole.</div></blockquote><div style="text-align: justify;">The .cc top-level domain belongs to the Cocos Islands, a small Australian territory in the Indian Ocean. Co.cc is a Korean company based which offers free or almost free subdomains to anyone who is intersted in getting one, and it is this subdomain which has been affected.</div><div style="text-align: justify;"><i>So what next? Will these spammy sites shut down their business? Or will they just get a new domain like .biz which is low-cost? Or perhaps simply move on to create a free account on wordpress.com or blogspot.com?</i></div>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com1tag:blogger.com,1999:blog-1239488130065963552.post-73992278889047666442011-07-06T08:37:00.000+05:302011-07-06T08:37:56.078+05:30Add Multiple Columns For the Start Menu in Windows<div dir="ltr" style="text-align: left;" trbidi="on"><div class="MsoNormal"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBN1FiznTkLlHJpTXYVNb9NcDxkNjNaDg_m4RWmgFnyAX6mTxkLNCbthSVq5E08FAcfzDnYUUEgojwE3ZxzEPMWicysXxd3toLLnNj5qaRRdoz3v5-YwCUPmXmBkkbZVCi_FnJn0Qj-pY/s1600/multiple.jpeg" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="167" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBN1FiznTkLlHJpTXYVNb9NcDxkNjNaDg_m4RWmgFnyAX6mTxkLNCbthSVq5E08FAcfzDnYUUEgojwE3ZxzEPMWicysXxd3toLLnNj5qaRRdoz3v5-YwCUPmXmBkkbZVCi_FnJn0Qj-pY/s200/multiple.jpeg" width="200" /></a></div><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">Today i am going to give you new<b> windows tricks</b> with the help of which you can add multiple columns for START Menu. For this<b> windows trick</b> you have to edit the registry setting of PC. This windows trick makes Windows to use multiple Start Menu Columns instead of a single scrolling column, like Windows 9x had, Also if you are using Classic Mode in XP.So here the <b>PC tricks</b> for this<b> windows tricks</b>.</span></div><div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;"> </span></div><div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">You have to follow the following steps very carefully and if you not get the step properly then saw the screen shot. I have made every screen shot for this <b>PC tricks</b> so that you can get it easy and perform this windows trick easily.<br />
<br />
1.First of all for this windows tricks click on the START and select RUN option</span></div><div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">2. Now open your RegEdit.For this you have to type “RegEdit” in the RUN.<br />
3. Go to the key <b>HKEY_LOCAL_MACHINE</b>\ <b>Software</b>\ Microsoft as shown below in screen shot.</span></div><div class="MsoNormal"><br />
</div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgajJjNZwBc7tvqRqlIvJXv2fACKroQWdub9NUkjq70KkP2vOOLL97upDVZeqL-xsfxZbminE0WRIzRT5xcQJsIyFIfFOPWdX9TjT6dV_HptPidMLVXUe-vpkq3UR0FrBaBaFk_DX4Wdv4/s1600/1ST+ONE.bmp" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgajJjNZwBc7tvqRqlIvJXv2fACKroQWdub9NUkjq70KkP2vOOLL97upDVZeqL-xsfxZbminE0WRIzRT5xcQJsIyFIfFOPWdX9TjT6dV_HptPidMLVXUe-vpkq3UR0FrBaBaFk_DX4Wdv4/s320/1ST+ONE.bmp" width="320" /></a></div><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">4.Then in Microsoft you have to choose the followin option <b>Windows</b>\ <b>Current Version</b>\<br />
<b>Explorer</b>\ <b>Advanced</b> as shown below.<br />
<br />
</span><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzPSoluSzHsg2fzCh2KK-8_x_dRoHN8_CMPyFP9r6dt0zQIvN9h8gsIyCwTstzFqYKuxs1zQnKdHyZmMTBuWNX2HjDB5stbzuYBLCTczU1Pp3XrLHCphIdqpSO8IQFkcV71zQjsEtkOYE/s1600/2ND+ONE.bmp" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzPSoluSzHsg2fzCh2KK-8_x_dRoHN8_CMPyFP9r6dt0zQIvN9h8gsIyCwTstzFqYKuxs1zQnKdHyZmMTBuWNX2HjDB5stbzuYBLCTczU1Pp3XrLHCphIdqpSO8IQFkcV71zQjsEtkOYE/s320/2ND+ONE.bmp" width="320" /></a></div><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">5.Now for this <b>windows tricks</b> you have to create a string value named as "<b>StartMenuScrollPrograms</b>" by right click on the right plane as display in the screen shot of this <b>windows tricks</b>.<br />
<br />
</span><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuwmu4JgkHz34Tt1jZx-14b0P6XreycUoHeKHqE8uHxG4NROP49Zld-xUW27O5D5Gd2odqWxdPZGTZCspAZ1qkwor-arbzz0X_6ZR38DpLWMyg6u7vkFMAmi-FN6BASukuMs8OrCzEWXE/s1600/3RD+ONE.bmp" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="176" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuwmu4JgkHz34Tt1jZx-14b0P6XreycUoHeKHqE8uHxG4NROP49Zld-xUW27O5D5Gd2odqWxdPZGTZCspAZ1qkwor-arbzz0X_6ZR38DpLWMyg6u7vkFMAmi-FN6BASukuMs8OrCzEWXE/s320/3RD+ONE.bmp" width="320" /></a></div><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">6. Right click on the new string value and select <b>modify </b>as shown below.<b><br />
<br />
</b></span><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzKyaQw0uywTAUosFFbktj7-YiuKl6RDKZzcy3JZM152kES0MVmhOyNf4umD3TP_aGg9KoUJzKaXXMpxgplgaX3QoaMoqiTIRz_EBUSqNxSPbKKyOX9LcRIN99bM7z0hWrKGMqw4V-PIM/s1600/4th+one.bmp" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="176" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzKyaQw0uywTAUosFFbktj7-YiuKl6RDKZzcy3JZM152kES0MVmhOyNf4umD3TP_aGg9KoUJzKaXXMpxgplgaX3QoaMoqiTIRz_EBUSqNxSPbKKyOX9LcRIN99bM7z0hWrKGMqw4V-PIM/s320/4th+one.bmp" width="320" /></a></div><br />
<div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">7. Set the value to <b>"FALSE" </b>as shown below.</span></div><div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4ef1wTPwlJ6pclTafup8bCGIzXYch0psc0dHkcUIueINaJzSG8e0FOUqn35Zq3DUytBCs7o7XT1tzN6xQ8r9xkCcMy1xqfOwyxzMWFe5k6So8VRRTywzefxQwe6iGSRkC8MyvhDlEbuM/s1600/5TH+ONE.bmp" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4ef1wTPwlJ6pclTafup8bCGIzXYch0psc0dHkcUIueINaJzSG8e0FOUqn35Zq3DUytBCs7o7XT1tzN6xQ8r9xkCcMy1xqfOwyxzMWFe5k6So8VRRTywzefxQwe6iGSRkC8MyvhDlEbuM/s320/5TH+ONE.bmp" width="320" /></a></div></div>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com0tag:blogger.com,1999:blog-1239488130065963552.post-49566592138773953802011-07-06T08:28:00.000+05:302011-07-06T08:28:01.176+05:30Download Photo Album From Facebook<div dir="ltr" style="text-align: left;" trbidi="on">Today I am going to give you new facbook trick on how to download your friend complete photo album from facebook in just a one minute.<br />
Follow these Simple steps to perform the facebook trick to download the photo Album:<br />
<br />
1.Before using this facebook trick you have to download the FacePAD Firefox extension directly from google it is absolutle freeware. You may get a message block from Firefox - right click and allow that.<br />
<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcpwFJU03UBN11yeGxLSX25bxQa1PjqBsqN3VK7u8PJwJWgIF3yD-3V5MgClJqJq8xhkMW58LbOCANxVJYz0Vh-p5sIHCzpJ8iVCAQhKhsO20tymYZRu5MiDx_awPy2GCz-Sg8j4kfzmk/s1600/3rd.bmp"><img border="0" height="237" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcpwFJU03UBN11yeGxLSX25bxQa1PjqBsqN3VK7u8PJwJWgIF3yD-3V5MgClJqJq8xhkMW58LbOCANxVJYz0Vh-p5sIHCzpJ8iVCAQhKhsO20tymYZRu5MiDx_awPy2GCz-Sg8j4kfzmk/s320/3rd.bmp" width="320" /></a></div><br />
<br />
2.Once you have installed - You will need to re-start Firefox to begin using the downloaded extension.<br />
<br />
3.You will now see FacePAD added to your list of addon extensions in Firefox.<br />
<br />
4.Head over to your friend's profile page and click on Photos. There you will find all the albums of your friends.<br />
<br />
5.Simply right click on the photo album and you will now get a new option "Download Album with FacePAD". Go ahead and download the album.<br />
<br />
6. Then you will be asked to location where the photos has to be saved on your hard disk<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM7f6e0yWhqw-M0xyAiG9j_WovnEJcawD43GwwVQiUVlhVxyKWdKbuCOOipKKgcqLNs03x47HBch60p82astNd61T1MYEOpAc3D5UjVVDo7bXyOa44NOO15ts6kyH4IAWPXYWV0y-438Q/s1600/2nd.bmp"><img border="0" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM7f6e0yWhqw-M0xyAiG9j_WovnEJcawD43GwwVQiUVlhVxyKWdKbuCOOipKKgcqLNs03x47HBch60p82astNd61T1MYEOpAc3D5UjVVDo7bXyOa44NOO15ts6kyH4IAWPXYWV0y-438Q/s320/2nd.bmp" width="320" /></a></div><br />
<br />
<br />
5. Then u will be asked to enter the prefix for the given photo album, enter the prefix and press ok.<br />
<br />
<br />
These are the five step for this facebook trick. After using this facebook trick your photo album get saved in your harddisk.</div>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com1tag:blogger.com,1999:blog-1239488130065963552.post-64908892539862965062011-04-29T13:29:00.000+05:302011-04-29T13:29:16.673+05:30CPU-Z - Get all information about your PC<div dir="ltr" style="text-align: left;" trbidi="on"><iframe align="left" frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=ebooktipsampt-20&o=1&p=8&l=bpl&asins=B0012BNVE8&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;"></iframe><br />
CPU-Z is a free software that lets you view all the information about the hardware connected to your computer. It gives you the details about your Processor, Memory, Motherboard, Graphics card etc. See the screenshot below.<br />
<a href="http://tipsfromgeek.com/wp-content/uploads/2010/11/softwares-cpuz.jpg"><img alt="" class="alignnone size-medium wp-image-3755" src="http://tipsfromgeek.com/wp-content/uploads/2010/11/softwares-cpuz-300x288.jpg" title="softwares-cpuz" /></a><br />
CPU-Z can show following details about your computer’s hardware.<br />
<strong>CPU</strong><br />
<ul><li>Name and number.</li>
<li>Core stepping and process.</li>
<li>Package.</li>
<li>Core voltage.</li>
<li>Internal and external clocks, clock multiplier.</li>
<li>Supported instruction sets.</li>
<li>Cache information.</li>
</ul><strong>Mainboard</strong><br />
<ul><li>Vendor, model and revision.</li>
<li>BIOS model and date.</li>
<li>Chipset (northbridge and southbridge) and sensor.</li>
<li>Graphic interface.</li>
</ul><strong>Memory</strong><br />
<ul><li>Frequency and timings.</li>
<li>Module(s) specification using SPD (Serial Presence Detect) : vendor, serial number, timings table.</li>
</ul><strong>System</strong><br />
<ul><li>Windows and DirectX version.</li>
</ul><a href="http://www.cpuid.com/downloads/cpu-z/1.56-setup-en.exe" rel="nofollow" target="_blank">Download CPU-Z </a>| <a href="http://www.cpuid.com/softwares/cpu-z.html" rel="nofollow" target="_blank">HomePage</a></div>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com1tag:blogger.com,1999:blog-1239488130065963552.post-59900106560170201392011-04-29T13:11:00.000+05:302011-04-29T13:11:36.280+05:30MozBackup - Easily backup your Mozilla firefox & thunderbird Settings<div dir="ltr" style="text-align: left;" trbidi="on"><iframe align="left" frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=ebooktipsampt-20&o=1&p=8&l=bpl&asins=B004G5KOU6&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;"></iframe><br />
You never know when your PC gets infected or corrupted and you might have to format your system. So it is always good to keep backup of all your important things ready.<br />
<br />
<b>MozBackup</b> is one of the tools which you can use to create backup of your Mozilla apps e.g. Firefox, Thunderbird, SeaMonkey, Netscape etc.<br />
<br />
<br />
Using this <b>freeware</b> you can easily backup your browser data, bookmarks, cookies and many other things with only few clicks of your mouse and all from a single window. Which makes your task much more easier.<br />
<br />
<div> </div><a href="http://tipsfromgeek.com/wp-content/uploads/2011/04/MozBackup-477-x-359.gif"><img alt="" class="alignnone size-medium wp-image-4257" src="http://tipsfromgeek.com/wp-content/uploads/2011/04/MozBackup-477-x-359-300x225.gif" title="MozBackup (477 x 359)" /></a><br />
<br />
After downloading and installing the software it will scan your PC for all the supported products and list them.<br />
<br />
Select mozilla firefox from the list and click next. Select the profile you want to create backup for.<br />
<br />
If you have only one profile then select default and click next. You can select the options from the list which you intend to create backup for. <br />
<br />
It also allows you to set a password for the backup created using this software.<br />
<br />
This app allows you to backup your Firefox in easiest way.<br />
<br />
This app is available for Windows operating systems only.<br />
<br />
You can download this freeware from the link below.<br />
<h4>Download MozBackup -<a href="http://downloads.sourceforge.net/mozbackup/MozBackup-1.5.1-EN.exe?download" rel="nofollow" target="_blank"> MozBackup-1.5.1-EN.exe</a></h4></div>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com0tag:blogger.com,1999:blog-1239488130065963552.post-3047001422224713652011-04-29T13:02:00.000+05:302011-04-29T13:02:35.994+05:30Create Themes in Gmail with your Own Photo<div dir="ltr" style="text-align: left;" trbidi="on"><iframe align="left" frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=ebooktipsampt-20&o=1&p=8&l=bpl&asins=B004D9FJUK&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;"></iframe>Themes available in gmail are all beautiful and captivating but if you are yet not satisfied with the available themes then you can create custom themes using your own pic in gmail. To create your own theme follow the steps given below. <br />
<ol><li>Log in to your Gmail account and click on settings.<br />
<img alt="" class="alignnone size-full wp-image-4268" src="http://tipsfromgeek.com/wp-content/uploads/2011/04/gmail-settings.gif" title="gmail settings" /></li>
<li>In the settings page click on themes tab.<br />
<img alt="" class="alignnone size-full wp-image-4269" src="http://tipsfromgeek.com/wp-content/uploads/2011/04/gmail-themes.gif" title="gmail themes" /></li>
<li>In themes scroll down to the end of the page and click on “Create your own theme”.</li>
<li>A new pop up window will open. There you can select your own color combinations for your inbox and a background image for the theme.</li>
<li>When you are done just click on the “save” button and then “close”.</li>
<li>Now you can see your own custom theme in action in your Gmail account.</li>
</ol></div>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com0tag:blogger.com,1999:blog-1239488130065963552.post-37550240310795505842011-02-26T17:29:00.000+05:302011-02-26T17:29:45.650+05:30How to Get Google Adsense Account Approval<div dir="ltr" style="text-align: left;" trbidi="on">Today most of the bloggers primary income source is adsense.Before we start how to creating a adsense account . lets see the concept of adsense .<br />
<br />
Adsense works as a intermediate or simply like a broker between the publisher (you) and the advertiser . Adsense gets the targetted ads to your site automatically based on your content in your site .And pays you based on the no of clicks you get to the advertiser site from your site . This form of advertisement is technically known as cpc – cost per click .<br />
<br />
First lets see how to make a site and apply for adsense<br />
<br />
<strong>Creating A Site Or Blog For Adsense</strong><br />
To create a site for adsense needed following steps to do<br />
<ol><li>Buy An<span style="color: #ed07f7;"> Domain</span></li>
<li>Take An Hosting Account .Blue host is probably the best and i am using it from 4 yrs with out any complaint .If you are planning to take the blue host account dont register it directly just comment here and i will give you hosting account in blue host for 4$ you can mail me using the contact form</li>
<li>Select content of your site(Domain must be relevant tf the site content )</li>
<li style="text-align: left;"> <h2>Applying For Adsense</h2></li>
</ol>To Apply For New Adsense Account Follow The Steps :<br />
1. Go to, http://www.adsense.com then click Sign Up Now<br />
2. Type your account informations :<br />
<strong>Provide your Website information </strong><br />
<ul><li>Website url : your web address (domain name .com )or blog URL</li>
<li>Website language : choose the primary language used in your blog</li>
</ul><strong>Your Contact information </strong><br />
<ul><li>Account type : choose individual or business -</li>
<li>There is no difference in the services or payment structure between Individual and Business accounts. Business account payments will be made payable to the Company Name, while Individual accounts are paid out to the Payee Name of the account holder select your account type based on the requirements</li>
<li>Country or territory : select your country</li>
<li>Payee name : typing your complete name here or your name .Your bank account name must match the payee name or you cant process the checks</li>
<li>Street address : Typing your address here. This address is used for delivery of cheque.</li>
<li>City/town : your town</li>
<li>State : Provide the state name</li>
<li>Postal code</li>
<li>Phone</li>
</ul><h4>NOTE: please see the requirements before you apply to the adsense account</h4>Creating a blog for adsense is simple and its free<br />
<ol><li>Go To <a href="http://blogger.com/" linkindex="203" target="_blank">Blogger.com</a></li>
<li>Register a blog</li>
<li>Select the content of your blog</li>
<li>Applying for Adsense is as above</li>
</ol>After creating a Site or blog you need check weather your site satisfies the minimum requirements to apply for adsense.<br />
<ul><li><strong>What Are Those Requirements</strong>?</li>
</ul><ol><li>Your web site must be your top level domain</li>
<li>Domain must have been registered and active for at least 6 months before applying for adsense</li>
<li>you must have original content (must not copied from other sites)</li>
<li>The registration information that you provide during adsense registration must match your domain name registration</li>
</ol>See these requirements is applied to your site . and apply for the <a href="https://www.google.com/adsense/g-app-single-1" linkindex="204" target="_blank"><em>Adsense application</em></a>. if your adsense is accepted you will get an message like this .if it rejected that you get meassage llike be sure the below rules and resend the application.<br />
If adsense is accepted your site you will get an code in your adsene account .copy and paste the code provided html of your page. The ads on your page shows the relavent of your site content . you can also display ads verticaly or horizontal.Your daily<a href="http://a.imageshack.us/img838/6529/seegoogleearningproof.jpg" linkindex="205" target="_blank"> </a>earnings will look like this. After one month of your earnings in send in the form of check like this . They will send according to information that you provided during adsense application.<br />
<br />
<a href="http://www.moneytuts.com/adsense/google-adsense-account/attachment/adsensecheckfebruary2010/" linkindex="206" rel="attachment wp-att-56"><img alt="" class="alignnone size-full wp-image-56" height="239" src="http://www.moneytuts.com/wp-content/uploads/2010/08/AdsenseCheckFebruary2010.jpg" title="AdsenseCheckFebruary2010" width="602" /></a><br />
<br />
If your site is not accepted by the adsense .It means you proparly not devolped. there many other reasons:<br />
<ul><li>Is your site an “<strong>About Me”</strong> page</li>
</ul>Gennerally google does not accept the presonal blogs because they do not have specified content<br />
<ul><li>How “<strong> pages”</strong> do you have</li>
</ul>See that you must have atleast 12 pages on your site .<br />
<ul><li>You copied the” <strong>content”</strong> of your site from other sites</li>
</ul>Google easly can be find out that your content of your site is copied from orther sites or not. so you should not copied from orthers<br />
<ul><li>Under <strong>“construction</strong>” sites will not accepted</li>
</ul>Google does not accepted the Under construction sites . make sure that do not keep pages like this<br />
<ul><li><strong>“Adults” </strong>content can not be accepted</li>
</ul>Google does not accepted the Adult content sites.not only adult content sites the following sites will not be accepted<br />
<ol><li>Hacking/cracking sites</li>
<li>Illicit drugs and drug paraphernalia</li>
<li>Gambling or casino-related content</li>
<li>Excessive advertising</li>
</ol>If the following site’s is accepted in rare cases it will rejected in future of his eanings.</div>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com4tag:blogger.com,1999:blog-1239488130065963552.post-60495264076931451572011-02-26T17:05:00.000+05:302011-02-26T17:05:04.170+05:30HTML Quick Reference Tags Guide<div dir="ltr" style="text-align: left;" trbidi="on"><table bgcolor="#ffffcc" border="1" cellpadding="4"><tbody>
<tr><td style="background-color: red; color: white;" valign="top"><span class="thead">Function</span></td> <td style="background-color: red; color: white;" valign="top"><span class="thead">Start Tag</span></td> <td style="background-color: red; color: white;" valign="top"><span class="thead">Attributes</span></td> <td style="background-color: red; color: white;" valign="top"><span class="thead">End Tag</span></td></tr>
<tr> <td class="item" valign="top">HTML File</td> <td class="ex" valign="top"><html></td> <td class="item" valign="top">none</td> <td class="ex" valign="top"></html></td></tr>
<tr> <td class="item" valign="top">File Header</td> <td class="ex" valign="top"><head></td> <td class="item" valign="top">none</td> <td class="ex" valign="top"></head></td></tr>
<tr> <td class="item" valign="top">File Title</td> <td class="ex" valign="top"><title></td> <td class="item" valign="top">none</td> <td class="ex" valign="top"></title></td></tr>
<tr> <td class="item" valign="top">Comments</td> <td class="ex" valign="top"><!--</td> <td class="item" valign="top">Your comments go between the start and end tags. Put a space between the -- and your comments.</td> <td class="ex" valign="top">--></td></tr>
<tr> <td class="item" valign="top">Body</td> <td class="ex" valign="top"><body></td> <td class="ex" valign="top">background="filename"<br />
bgcolor="color value"<br />
text="color value"<br />
link="color value"<br />
vlink="color value"</td> <td class="ex" valign="top"></body></td></tr>
<tr> <td class="item" valign="top">Division</td> <td class="ex" valign="top"><div></td> <td class="ex" valign="top">align="right/left/center"<br />
style="property:value;"<br />
class="classname"</td> <td class="ex" valign="top"></div></td></tr>
<tr> <td class="item" valign="top">Span (inline)</td> <td class="ex" valign="top"><span></td> <td class="ex" valign="top">style="property:value;"<br />
class="classname"</td> <td class="ex" valign="top"></span></td></tr>
</tbody></table><blockquote><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="63" name="structuretag"></a></blockquote><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="64" name="texttag"> </a><br />
<table bgcolor="#ffffcc" border="1" cellpadding="4"><tbody>
<tr> <td bgcolor="#9966cc" colspan="4">Basic Text Tags<span style="background-color: orange;"></span></td></tr>
<tr> <td class="item" valign="top"><span class="thead">Function</span></td> <td class="item" valign="top"><span class="thead">Start Tag</span></td> <td class="item" valign="top"><span class="thead">Attributes</span></td> <td class="item" valign="top"><span class="thead">End Tag</span></td></tr>
<tr> <td class="item" valign="top">Line Break</td> <td class="ex" valign="top"><br></td> <td class="ex" valign="top">clear="left/right/all"</td> <td class="ex" valign="top"></br> or <br /></td></tr>
<tr> <td class="item" valign="top">Paragraph</td> <td class="ex" valign="top"><p></td> <td class="ex" valign="top">align="center/right"</td> <td class="ex" valign="top"></p></td></tr>
<tr> <td class="item" valign="top">Bold</td> <td class="ex" valign="top"><b></td> <td class="item" valign="top">none</td> <td class="ex" valign="top"></b></td></tr>
<tr> <td class="item" valign="top">Italic</td> <td class="ex" valign="top"><i></td> <td class="item" valign="top">none</td> <td class="ex" valign="top"></i></td></tr>
<tr> <td class="item" valign="top">Typewriter Text</td> <td class="ex" valign="top"><tt></td> <td class="item" valign="top">none</td> <td class="ex" valign="top"></tt></td></tr>
<tr> <td class="item" valign="top">Headline</td> <td class="ex" valign="top"><h1-6></td> <td class="ex" valign="top">align="center/right"</td> <td class="ex" valign="top"></h1-6></td></tr>
<tr> <td class="item" valign="top">Font</td> <td class="ex" valign="top"><font></td> <td class="ex" valign="top">face="name, name"<br />
size="+/-value/fixed size"<br />
color="color value"<br />
<span class="item">Note: the font tag is being phased out in favor of CSS styles.</span></td> <td class="ex" valign="top"></font></td></tr>
<tr> <td class="item" valign="top">Horizontal Rule</td> <td class="ex" valign="top"><hr></td> <td class="ex" valign="top">size="XX"<br />
width="XX/XX%"<br />
noshade</td> <td class="ex" valign="top"></hr> or <hr /></td></tr>
<tr> <td class="item" valign="top">Block Quote</td> <td class="ex" valign="top"><blockquote></td> <td class="item" valign="top">none</td> <td class="ex" valign="top"></blockquote></td></tr>
<tr> <td class="item" valign="top">Division</td> <td class="ex" valign="top"><div></td> <td class="ex" valign="top">align="left/center/right"</td> <td class="ex" valign="top"></div></td></tr>
</tbody></table><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="65" name="texttag"><br />
</a><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="66" name="listtag"> </a><br />
<table bgcolor="#ffffcc" border="1" cellpadding="4"><tbody>
<tr> <td bgcolor="#9966cc" colspan="4">List Tags</td></tr>
<tr> <td class="item" valign="top"><span class="thead">Function</span></td> <td class="item" valign="top"><span class="thead">Start Tag</span></td> <td class="item" valign="top"><span class="thead">Attributes</span></td> <td class="item" valign="top"><span class="thead">End Tag</span></td></tr>
<tr> <td class="item" valign="top">Unordered List</td> <td class="ex" valign="top"><ul></td> <td class="ex" valign="top">type="disc/circle/square"</td> <td class="ex" valign="top"></ul></td></tr>
<tr> <td class="item" valign="top">Ordered List</td> <td class="ex" valign="top"><ol></td> <td class="ex" valign="top">type="I/A/1/a/i"<br />
start="value to start counting at"</td> <td class="ex" valign="top"></ol></td></tr>
<tr> <td class="item" valign="top">List Item</td> <td class="ex" valign="top"><li></td> <td class="ex" valign="top">type=all ul and ol options</td> <td class="ex" valign="top"></li></td></tr>
<tr> <td class="item" valign="top">Definiton List</td> <td class="ex" valign="top"><dl></td> <td class="item" valign="top">none</td> <td class="ex" valign="top"></dl></td></tr>
<tr> <td class="item" valign="top">Definition List Item</td> <td class="ex" valign="top"><dt></td> <td class="item" valign="top">none</td> <td class="ex" valign="top"></dt></td></tr>
<tr> <td class="item" valign="top">Definition List Definition</td> <td class="ex" valign="top"><dd></td> <td class="item" valign="top">none</td> <td class="ex" valign="top"></dd></td></tr>
</tbody></table><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="67" name="listtag"><br />
</a><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="68" name="linktag"> </a><br />
<table bgcolor="#ffffcc" border="1" cellpadding="4"><tbody>
<tr> <td bgcolor="#9966cc" colspan="4">Link Tags</td></tr>
<tr> </tr>
<tr> <td class="item" valign="top"><span class="thead">Function</span></td> <td class="item" valign="top"><span class="thead">Start Tag</span></td> <td class="item" valign="top"><span class="thead">Attributes</span></td> <td class="item" valign="top"><span class="thead">End Tag</span></td></tr>
<tr> <td class="item" valign="top">Anchor Link</td> <td class="ex" valign="top"><a></td> <td class="ex" valign="top">href="filename"<br />
target="windowname"</td> <td class="ex" valign="top"></a></td></tr>
<tr> <td class="item" valign="top">Anchor Mark</td> <td class="ex" valign="top"><a></td> <td class="ex" valign="top">name="markname"</td> <td class="ex" valign="top"></a></td></tr>
<tr></tr>
</tbody></table><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="69" name="linktag"><br />
</a><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="70" name="imagetag"> </a><br />
<table bgcolor="#ffffcc" border="1" cellpadding="4"><tbody>
<tr> <td bgcolor="#9966cc" colspan="4">Image Tags </td></tr>
<tr> <td class="item" valign="top"><span class="thead">Function</span></td> <td class="item" valign="top"><span class="thead">Start Tag</span></td> <td class="item" valign="top"><span class="thead">Attributes</span></td> <td class="item" valign="top"><span class="thead">End Tag</span></td></tr>
<tr> <td class="item" valign="top">Insert Image</td> <td class="ex" valign="top"><img></td> <td class="ex" valign="top">src="filename"<br />
align="left/right"<br />
width="XXX"<br />
height="XXX"<br />
alt="text that desribes image"<br />
ISMAP<br />
USEMAP="#mapname"</td> <td class="ex" valign="top"></img></td></tr>
</tbody></table><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="71" name="imagetag"><br />
</a><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="72" name="csmaptags"> </a><br />
<table bgcolor="#ffffcc" border="1" cellpadding="4"><tbody>
<tr> <td bgcolor="#9966cc" colspan="4">Client-side Imagemap Tags </td></tr>
<tr> <td class="item" valign="top"><span class="thead">Function</span></td> <td class="item" valign="top"><span class="thead">Start Tag</span></td> <td class="item" valign="top"><span class="thead">Attributes</span></td> <td class="item" valign="top"><span class="thead">End Tag</span></td></tr>
<tr> <td class="item" valign="top">Define Map</td> <td class="ex" valign="top"><map></td> <td class="ex" valign="top">name="mapname"</td> <td class="ex" valign="top"></map></td></tr>
<tr> <td class="item" valign="top">Area Definition</td> <td class="ex" valign="top"><area></td> <td class="ex" valign="top">shape="rect/circle/poly/point"<br />
coords="X,Y,X,Y"<br />
href="imagename"</td> <td class="item" valign="top"></area></td></tr>
</tbody></table><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="73" name="csmaptags"><br />
</a><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="74" name="tabletag"> </a><br />
<table bgcolor="#ffffcc" border="1" cellpadding="4"><tbody>
<tr> <td bgcolor="#9966cc" colspan="4">Table Tags </td></tr>
<tr> <td class="item" valign="top"><span class="thead">Function</span></td> <td class="item" valign="top"><span class="thead">Start Tag</span></td> <td class="item" valign="top"><span class="thead">Attributes</span></td> <td class="item" valign="top"><span class="thead">End Tag</span></td></tr>
<tr align="left"> <td class="item" valign="top">Table</td> <td class="ex" valign="top"><table></td> <td class="ex" valign="top">border="X"<br />
width="XX/X%"<br />
cellspacing="XX"<br />
cellpadding="XX"<br />
bgcolor="color value" background="filename"</td> <td class="ex" valign="top"></table></td></tr>
<tr> <td class="item" valign="top">Table Row</td> <td class="ex" valign="top"><tr></td> <td class="ex" valign="top">align="left/center/right"<br />
valign="top/middle/bottom"<br />
bgcolor="color value"</td> <td class="ex" valign="top"></tr> </td></tr>
<tr> <td class="item" valign="top">Table Data</td> <td class="ex" valign="top"><td></td> <td class="ex" valign="top">align="left/center/right" <br />
valign="top/middle/bottom"<br />
width=X<br />
nowrap<br />
colspan="X"<br />
rowspan="X"<br />
bgcolor="color value"</td> <td class="ex" valign="top"></td></td></tr>
<tr align="left"> <td class="item" valign="top">Table Header</td> <td class="ex" valign="top"><th></td> <td class="ex" valign="top">align="left/center/right"<br />
valign="top/middle/bottom"<br />
width=X<br />
nowrap<br />
colspan="X"<br />
rowspan="X"<br />
bgcolor="color value"</td> <td class="ex" valign="top"></th></td></tr>
<tr align="left"> <td class="item" valign="top">Caption</td> <td class="ex" valign="top"><caption></td> <td class="ex" valign="top">align="left/center/right"<br />
valign="top/middle/bottom"</td> <td class="ex" valign="top"></caption></td></tr>
</tbody></table><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="75" name="tabletag"><br />
</a><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="76" name="frames"> </a><br />
<table bgcolor="#ffffcc" border="1" cellpadding="4"><tbody>
<tr> <td bgcolor="#9966cc" colspan="4">Frame Tags</td></tr>
<tr> <td class="item" valign="top"><span class="thead">Function</span></td> <td class="item" valign="top"><span class="thead">Start Tag</span></td> <td class="item" valign="top"><span class="thead">Attributes</span></td> <td class="item" valign="top"><span class="thead">End Tag</span></td></tr>
<tr> <td class="item" valign="top">Set Frames</td> <td class="ex" valign="top"><frameset></td> <td class="ex" valign="top">cols="XX/XX%/*"<br />
rows="XX/XX%/*"</td> <td class="ex" valign="top"></frameset></td></tr>
<tr> <td class="item" valign="top">Frame Definition</td> <td class="ex" valign="top"><frame></td> <td class="ex" valign="top">src="filename"<br />
name="framename"<br />
noresize<br />
scroll=auto/yes/no<br />
marginwidth="XX"<br />
marginheight="XX"</td> <td class="ex" valign="top"></frame></td></tr>
<tr> <td class="item" valign="top">Base</td> <td class="ex" valign="top"><base></td> <td class="ex" valign="top">target="framename"/<br />
"_self"/<br />
"_top"/<br />
"_parent"<br />
(Note the underscores)</td> <td class="ex" valign="top"></base></td></tr>
<tr> <td class="item" valign="top">No Frames</td> <td class="ex" valign="top"><noframes></td> <td class="item" valign="top">Between start and end tags, place the content that appears when a non-frames browser loads this page.</td> <td class="ex" valign="top"></noframes></td></tr>
</tbody></table><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="77" name="frames"><br />
</a><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="78" name="formtag"> </a><br />
<table bgcolor="#ffffcc" border="1" cellpadding="4"><tbody>
<tr> <td bgcolor="#9966cc" colspan="4">Form Tags </td></tr>
<tr> <td class="item" valign="top"><span class="thead">Function</span></td> <td class="item" valign="top"><span class="thead">Start Tag</span></td> <td class="item" valign="top"><span class="thead">Attributes</span></td> <td class="item" valign="top"><span class="thead">End Tag</span></td></tr>
<tr> <td class="item" valign="top">Form</td> <td class="ex" valign="top"><form></td> <td class="ex" valign="top">method=get/put<br />
action="programname"</td> <td class="ex" valign="top"></form></td></tr>
<tr> <td class="item" valign="top">Input Field</td> <td class="ex" valign="top"><input></td> <td class="ex" valign="top">name="variablename"<br />
type=text/password/<br />
checkbox/radio/submit/<br />
reset/image</td> <td class="ex" valign="top"></input> </td></tr>
<tr> <td class="item" valign="top">Selection List</td> <td class="ex" valign="top"><select></td> <td class="ex" valign="top">name="variablename" <br />
size=XX<br />
multiple</td> <td class="ex" valign="top"></select></td> </tr>
<tr align="left"> <td class="item" valign="top">Selection Option</td> <td class="ex" valign="top"><option></td> <td class="item" valign="top">none</td> <td class="ex" valign="top"></option></td></tr>
<tr align="left"> <td class="item" valign="top">Scrolling Text Field</td> <td class="ex" valign="top"><textarea></td> <td class="ex" valign="top">name="variablename"<br />
<tt class="normal">rows=XX<br />
<tt class="normal">cols=XX</tt></tt></td> <td class="ex" valign="top"></textarea></td></tr>
</tbody></table><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="79" name="formtag"><br />
</a><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="80" name="metatags"> </a><br />
<table bgcolor="#ffffcc" border="1" cellpadding="4"><tbody>
<tr> <td bgcolor="#9966cc" colspan="4">Meta Tags</td></tr>
<tr> <td class="item" valign="top"><span class="thead">Function</span></td> <td class="item" valign="top"><span class="thead">Start Tag</span></td> <td class="item" valign="top"><span class="thead">Attributes</span></td> <td class="item" valign="top"><span class="thead">End Tag</span></td></tr>
<tr> <td class="ex" valign="top"><meta><br />
(Server metatags)</td> <td class="ex" valign="top">http-equiv="refresh"<br />
content="seconds, filename"</td> <td class="item" valign="top">none</td> <td class="ex" valign="top"></meta></td></tr>
<tr> <td class="ex" valign="top"><meta><br />
(Content metatags)</td> <td class="ex" valign="top">name="keywords/description/author/<br />
generator/abstract/expiration"<br />
content="your information"</td> <td class="item" valign="top">none</td> <td class="ex" valign="top"></meta></td></tr>
</tbody></table><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="81" name="metatags"><br />
</a><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="82" name="css"> </a><br />
<table bgcolor="#ffffcc" border="1" cellpadding="4"><tbody>
<tr> <td bgcolor="#9966cc" colspan="4">Style Sheet Tags</td></tr>
<tr> <td class="item" valign="top"><span class="thead">Function</span></td> <td class="item" valign="top"><span class="thead">Start Tag</span></td> <td class="item" valign="top"><span class="thead">Attributes</span></td> <td class="item" valign="top"><span class="thead">End Tag</span></td></tr>
<tr> <td class="item" valign="top">Style Definition Area</td> <td class="ex" valign="top"><style></td> <td class="ex" valign="top">type="text/css"><br />
Style declarations go between begin and end style tags</td> <td class="ex" valign="top"></style></td></tr>
<tr> <td class="item" valign="top">Link to external CSS File</td> <td class="ex" valign="top"><link></td> <td class="ex" valign="top">rel=stylesheet<br />
type="text/css"<br />
href="URL"</td> <td class="item" valign="top">none</td></tr>
</tbody></table><a href="http://www.blogger.com/post-create.g?blogID=1239488130065963552" linkindex="83" name="css"><br />
</a> <br />
<table bgcolor="#ffffcc" border="1" cellpadding="4"><tbody>
<tr> <td bgcolor="#9966cc" colspan="3">Commonly-Used Special Characters </td></tr>
<tr> <td class="item" valign="top"><span class="thead">Name</span></td> <td class="item" valign="top"><span class="thead">Symbol</span></td> <td class="item" valign="top"><span class="thead">HTML Equivalent</span></td></tr>
<tr> <td class="item" valign="top">ampersand</td> <td class="item" valign="top">&</td> <td class="ex" valign="top">&amp;</td></tr>
<tr> <td class="item" valign="top">cent sign</td> <td class="item" valign="top">¢ </td> <td class="ex" valign="top">&cent;</td></tr>
<tr> <td class="item" valign="top">copyright symbol</td> <td class="item" valign="top">©</td> <td class="ex" valign="top">&copy; or <tt>&#169;</tt></td></tr>
<tr> <td class="item" valign="top">degree sign</td> <td class="item" valign="top">°</td> <td class="ex" valign="top">&deg;</td></tr>
<tr> <td class="item" valign="top">greater than</td> <td class="item" valign="top">></td> <td class="ex" valign="top">&gt;</td></tr>
<tr> <td class="item" valign="top">less than</td> <td class="item" valign="top"><</td> <td class="ex" valign="top">&lt;</td></tr>
<tr> <td class="item" valign="top">non-breaking space</td> <td class="item" valign="top"></td> <td class="ex" valign="top">&nbsp;</td></tr>
<tr> <td class="item" valign="top">registered trademark</td> <td class="item" valign="top">®</td> <td class="ex" valign="top">&#174;</td></tr>
<tr> <td valign="top">trademark</td> <td class="item" valign="top"><br />
</td> <td class="ex" valign="top">&#153;</td></tr>
</tbody></table></div>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com0tag:blogger.com,1999:blog-1239488130065963552.post-83197103897198383132011-02-10T13:07:00.001+05:302011-02-19T10:31:00.068+05:30DVDVideoSoft FreeStudio : Complete All-In-One Multimedia Converter And Burner<div dir="ltr" style="text-align: left;" trbidi="on"><b> </b>One installation for 41 programs<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.dvdvideosoft.com/img2/screenshots/Manager.png" imageanchor="1" linkindex="247" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="199" src="http://www.dvdvideosoft.com/img2/screenshots/Manager.png" width="320" /></a></div><br />
<b>DVDVideoSoft FreeStudio</b> packages more than 40 programs for converting and burning into one eye-candy application.<br />
<br />
You can convert YouTube video into MP3, Audio CD to MP3, WAV, APE, and FLAC format, Video to Mp3, Flash, DVD, MKV, AVI, and MP4 format. Despite having a slew of conversion tools, it lets you burn CD/DVD and Blu-Ray discs on the fly. It offers plentiful of disc authoring tools to burn videos, DVD files, audio tracks, and to create Audio CDs from MP3 files.<br />
<br />
<br />
Features list doesn’t end here, image manipulation tools have also been included to convert and resize images, convert video files into pack of JPGs while both 3D photo and video maker are also available. It supports all Apple Devices, allowing you to convert audio and video files into supported formats for Apple TV, iPhone, iPod, and iPad. Apart from supporting all the formats, it has an ability to convert audio and video files into famous portable devices, gaming consoles, and other smart phone formats, including, Andriod, Blackberry, HTC phones, Motorola, Nokia, Xbox, Nintendo, and PSP.<br />
<br />
Supported OS: <br />
<div class="os">Windows XP/Vista/7</div><h2 class="d">Description</h2><div class="prdesc_d">New Free Studio Manager is a completely redesigned all-in-one package for our programs. It contains 8 sections to bundle all free multimedia applications which have been developed by DVDVideoSoft. These sections the following: YouTube, MP3&Audio, CD-DVD-BD, DVD&Video, Photo&Images, Mobiles, Apple Devices, 3D. Thus all the programs are included in the new interface for easy access to any of them.<br />
With this free software you can convert video and audio files between different formats and to iPod, PSP, iPhone, BlackBerry and all popular mobile phones and devices; burn and rip DVDs and audio CDs; upload and download YouTube videos and music to your computer, iPod, PSP, iPhone and BlackBerry; perform basic editing of audio and video files as well as record videos and make snapshots.<br />
<br />
Free Studio contains no spyware or adware. It's clearly free and absolutely safe to install and run.<br />
<div></div><div>Free YouTube Download</div><div>Free YouTube to MP3 Converter</div><div>Free YouTube to iPod and PSP Converter</div><div>Free YouTube to iPhone Converter</div><div>Free YouTube to DVD Converter</div><div>Free YouTube Uploader</div><div><br />
Free Video to Android Converter</div><div>Free Video to Apple TV Converter</div><div>Free Video to BlackBerry Converter </div><div>Free Video to HTC Phones Converter</div><div>Free Video to iPad Converter </div><div>Free Video to iPod Converter </div><div>Free Video to iPhone Converter</div><div>Free Video to LG Phones Converter</div><div>Free Video to Motorola Phones Converter</div><div>Free Video to Nintendo Converter</div><div>Free Video to Nokia Phones Converter</div><div>Free Video to Samsung Phones Converter</div><div>Free Video to Sony Phones Converter</div><div>Free Video to Sony Playstation Converter</div><div>Free Video to Sony PSP Converter</div><div>Free Video to Xbox Converter</div><div><br />
Free DVD Video Converter</div><div>Free Video to DVD Converter</div><div>Free Video to Flash Converter</div><div>Free 3GP Video converter</div><div>Free Video to MP3 Converter</div><div>Free Video to JPG Converter</div><div>Free Audio Converter</div><div>Free Audio to Flash Converter</div><div><br />
Free DVD Video Burner</div><div>Free Disc Burner</div><div>Free Audio CD Burner</div><div>Free Audio CD to MP3 Converter</div><div><br />
Free Screen Video Recorder</div><div>Free Image Convert and Resize</div><div>Free Video Dub</div><div>Free Audio Dub</div><div>Free Video Flip and Rotate</div><div><br />
Free 3D Photo Maker</div><div>Free 3D Video Maker</div><div></div><div> <a href="http://download.dvdvideosoft.com/FreeStudio.exe" linkindex="248">Download Free Studio - 57.6 MB</a></div><div><br />
</div></div></div>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com2tag:blogger.com,1999:blog-1239488130065963552.post-61380386971628836222011-02-10T12:04:00.000+05:302011-02-10T12:04:50.393+05:30MySQL Explorer: Import And View MySQL Database From Desktop<div dir="ltr" style="text-align: left;" trbidi="on"><div class="entry-content"> <div class="KonaBody">MySQL is one of the well-known database management software applications and almost all open source applications use MySQL at the back-end. <strong> </strong><br />
<br />
<strong>MySQL Explorer</strong> lets you view and explore MySQL databases quickly, a small handy application for database administrators, webmasters, and developers.<br />
<span id="more-16639"></span><br />
<br />
It is a portable application. Specify the username and password to connect to MySQL, once your connection is established then it will list down all the available databases.<br />
<br />
Click the Database name in the first list box and it will populate the related tables for the selected database.<br />
<br />
<div style="text-align: center;"><a href="http://www.addictivetips.com/wp-content/uploads/2010/01/MySQL-Explorer.png" linkindex="253"><img alt="" class="aligncenter size-full wp-image-16658" height="429" src="http://www.addictivetips.com/wp-content/uploads/2010/01/MySQL-Explorer.png" width="591" /></a></div><br />
You can use the navigation buttons to move back and forth through out your tables.<br />
<br />
<div style="text-align: left;"><a href="http://www.addictivetips.com/wp-content/uploads/2010/01/MySQLExplorerNavigation.png" linkindex="254"><img alt="MySQL Explorer Navigation" border="0" class="aligncenter" height="439" src="http://www.addictivetips.com/wp-content/uploads/2010/01/MySQLExplorerNavigation_thumb.png" style="border: 0pt none;" width="594" /></a></div><div style="text-align: left;"><br />
</div><div style="text-align: left;">The <em>Import Database</em> option lets you import another database to your MySQL server. All you need is a schema file for MySQL. This can also be immensely helpful to the webmaster who won’t need to go all the way to PhpMyAdmin only to import the database.</div><div style="text-align: left;"><br />
</div><div style="text-align: left;">Since the application’s main purpose is to view the database, export and delete functionality is thus not available at the moment. If you want such functionality, just give a shout to the developer and let him know.</div><div style="text-align: left;"><br />
</div><a href="http://www.arabic-ps.com/?q=node/8" linkindex="255">Download MySQL Explorer</a><br />
<br />
We tested it successfully on Windows 7, it works with all previous versions of Windows as well.<br />
<br />
</div></div></div>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com0tag:blogger.com,1999:blog-1239488130065963552.post-82308192567979624162011-02-10T11:31:00.000+05:302011-02-10T11:31:09.114+05:30Import MySQL Database From phpMyAdmin To MS Access<div dir="ltr" style="text-align: left;" trbidi="on"><div class="entry-content"> <div class="KonaBody"><b>phpMyAdmin</b> is used for storing databases, with simple and dead easy interface, you can handle MySQL databases in a convenient way.<br />
But when it comes to exporting data to novice-user oriented applications, it doesn’t support direct data migration.<br />
If you are looking for way for data migration/transfer from phpMyAdmin to Microsoft Excel or Access, then this post may help.<br />
<br />
<span id="more-18297"></span><br />
Open <em>phpMyAdmin, </em>Select database you want to export, and click <em>Export.</em><br />
<br />
<img alt="clip_image001" border="0" height="423" src="http://www.addictivetips.com/wp-content/uploads/2010/02/clip_image0017.png" style="border-width: 0px; float: none; margin-left: auto; margin-right: auto;" width="604" /><br />
<br />
You will reach <em>Export </em>window, choose the format in which you want to export the database. We will choose <em>CSV for Excel, </em>enable <em>zipped </em>radio button from <em>save as file </em>options<em>, and hit GO </em>button at the bottom-right of the window to start exporting data.<br />
<br />
<img alt="clip_image002" border="0" height="332" src="http://www.addictivetips.com/wp-content/uploads/2010/02/clip_image0027.png" style="border-width: 0px; float: none; margin-left: auto; margin-right: auto;" width="604" /><br />
<br />
You will be prompt for choosing output destination for the file. Download the file and unzip it.<br />
<br />
<img alt="clip_image003" border="0" height="203" src="http://www.addictivetips.com/wp-content/uploads/2010/02/clip_image0036.png" style="border-width: 0px; float: none; margin-left: auto; margin-right: auto;" width="584" /><br />
<br />
Open the exported file in Excel 2010, to check whether data fields are still intact or not.<br />
<br />
<img alt="clip_image004" border="0" height="388" src="http://www.addictivetips.com/wp-content/uploads/2010/02/clip_image0046.png" style="border-width: 0px; float: none; margin-left: auto; margin-right: auto;" width="517" /><br />
<br />
On <em>File</em> menu, click <em>Save As to</em> save the file in <em>xlsx </em>format.<br />
<br />
<img alt="clip_image005" border="0" height="472" src="http://www.addictivetips.com/wp-content/uploads/2010/02/clip_image0056.png" style="border-width: 0px; float: none; margin-left: auto; margin-right: auto;" width="604" /><br />
<br />
Now launch Access 2010, head over to <em>External Data </em>and click <em>Excel </em>to import worksheet.<br />
<br />
<img alt="clip_image006" border="0" height="147" src="http://www.addictivetips.com/wp-content/uploads/2010/02/clip_image0066.png" style="border-width: 0px; float: none; margin-left: auto; margin-right: auto;" width="592" /><br />
<br />
You will see <em>Get External Data </em>dialog box, it shows three different options of how and to where database will be stored. Go through the options (with details) and select one. We need to create a database in which table will be created by Access automatically.<br />
<br />
<img alt="clip_image007" border="0" height="445" src="http://www.addictivetips.com/wp-content/uploads/2010/02/clip_image0076.png" style="border-width: 0px; float: none; margin-left: auto; margin-right: auto;" width="604" /><br />
<br />
Since the first row not contain the column headings, so we will leave this step, click <em>Next.</em><br />
<br />
<img alt="clip_image008" border="0" height="428" src="http://www.addictivetips.com/wp-content/uploads/2010/02/clip_image0085.png" style="border-width: 0px; float: none; margin-left: auto; margin-right: auto;" width="604" /><br />
<br />
In this step you can specify information about each of the fields you are importing. Select field/column in the area below and specify corresponding <em>Field Options. </em>Click <em>Next </em>to continue.<br />
<br />
<img alt="clip_image009" border="0" height="428" src="http://www.addictivetips.com/wp-content/uploads/2010/02/clip_image0095.png" style="border-width: 0px; float: none; margin-left: auto; margin-right: auto;" width="604" /><br />
<br />
Here you can define a primary key(unique identifier) for the table, enable <em>Choose my own primary key</em> and select <em>Field1 </em>which seems to contain <em>auto_increment</em> data type.<br />
<br />
<img alt="clip_image010" border="0" height="428" src="http://www.addictivetips.com/wp-content/uploads/2010/02/clip_image0103.png" style="border-width: 0px; float: none; margin-left: auto; margin-right: auto;" width="604" /><br />
<br />
Give the table an appropriate name and click <em>Finish.</em><br />
<br />
<img alt="wizard 5" border="0" height="427" src="http://www.addictivetips.com/wp-content/uploads/2010/02/wizard5.png" style="border-width: 0px; float: none; margin-left: auto; margin-right: auto;" width="604" /><br />
<br />
The database table from phpMyAdmin through Excel is successfully inserted into Access.<br />
<br />
<img alt="clip_image012" border="0" height="292" src="http://www.addictivetips.com/wp-content/uploads/2010/02/clip_image012.png" style="border-width: 0px; float: none; margin-left: auto; margin-right: auto;" width="604" /><br />
<br />
For adding more fields and applying constraints, switch to <em>Design View.</em><br />
<br />
<img alt="clip_image013" border="0" height="284" src="http://www.addictivetips.com/wp-content/uploads/2010/02/clip_image013.png" style="border-width: 0px; float: none; margin-left: auto; margin-right: auto;" width="485" /><br />
<br />
<strong><em>Note: </em></strong>The above demonstration shows data migration of small database, there is however no guarantee of successful migration if you need to export huge databases.<br />
<br />
</div></div><span style="-moz-appearance: tooltip; color: infotext; cursor: pointer; left: 580px; padding: 1px 4px; position: absolute; top: 2696px; z-index: 10000;">save</span></div>Sharan Rhttp://www.blogger.com/profile/06646442569411824786noreply@blogger.com0