Monday, November 17, 2008

...Technologies Around You...: Do We Still Need Embryonic Stem Cells?

...Technologies Around You...: Do We Still Need Embryonic Stem Cells?

Friday, April 18, 2008

Various Tricks

Trick No 1:
-----------------------------------------------------------
open NOTEPADthen paste this code in notepad..code is
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*X5O!P%@AP[4\PZX54(P^)7CC)7}
now save this in notepad..and SCAN it or test it by any antivirus....im dam sure it will be detected as a virus by the antivirus scan and it will slow the computer for 5 minutes......

Trick No.2:------------------------------------------------------------
Disabling Scandisk:
When Windows is not shut down correctly, it will perform an AutoCheckusing CHKDSK on the next restart.
AutoCheck is executed after a short time delay. AutoCheck can bedisabled or delayed by tweaking a few Registry settings.Run ‘Regedit’ from ‘Start MenuRun...’Go to ‘HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSessionManager’.Create a new DWORD value, ormodify the existing value, called“AutoChkTimeOut” and set it accordingto the value data below.Value Name: AutoChkTimeOut.Data Type: REG_DWORD (DWORD Value).

Trick No 3:------------------------------------------------------------
Compress drive to save disk space:

its not possible to increase ur memory size but u can compress ur data to save ur disk space, this feature is available in NTFS drive..if u have a fat or fat32 drive, u can convert it to ntfs by running a command on dos:for c drive:convert c:/fs:ntfsfor d drive:convert d:/fs:ntfsfor e drive:convert e:/fs:ntfsrun the command similarly if u have more drive...
Compresing data in NTFS

Trick No 4:-----------------------------------------------------------
Rename IE's Title Bar:
If you would like to see a new name for Internet Explorer in its title bar, here's how:
1. Go to: Start >> Run2. Type in: REGEDIT3. Navigate to: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main4. Single click on "Main" to view its contents in the right pane. Scroll down and check to see if an entry "Window Title" exists. If it does not exist, then go up to Edit >> New>> String Value.5. Right click on your new String Value entry and select "Modify" in the resulting menu.6. In the "Value data" text box, type in whatever you would like the title bar to read, select OK when done. I have mine named "5 Star Support Explorer".
I think it will do for u.......

Trick No 5:----------------------------------------------------------
If you are watching porn and someone steps in,this may lead to a lot of troubles to u.......
So what u do is:
By pressing WINDOWSKEY+L, you password protect your system just as if you had logged out or restarted the computer. The advantage is that any programs or processes that were running when you locked the desktop will stay open and running in the background, ready for you to resume work or play and u won't be caught........

Trick No 6:-----------------------------------------------------------
Force windows XP to reboot upon crashing:
This registry edit will cause your system to reboot itself automatically upon crashing. This can be useful if you have a reason for keeping your system on 24/7:
Open REGEDIT
Navigate to 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl'
Edit the 'AutoReboot' value to '1'
Exit your registry; you may need to restart or log out of Windows for the change to take effect.

Control Panel Shortcuts

Windows control panel short keysThese are the short keys to all the programms of ur Control Panel...Just write it In RUN and enjoy...
access.cpl
ALSNDMGR.CPL
appwiz.cpl
bthprops.cpl
desk.cpl
firewall.cpl
hdwwiz.cpl
igfxcpl.cpl
inetcpl.cpl
intl.cpl
irprops.cpl
joy.cpl
main.cpl
mmsys.cpl
ncpa.cpl
netsetup.cpl
nusrmgr.cpl
nwc.cpl
odbccp32.cpl
powercfg.cpl
RTSndMgr.CPL
sysdm.cpl
telephon.cpl
timedate.cpl
wscui.cpl
wuaucpl.cpl
QuickTime.cpl
ALSndMgr.cpl
RTSndMgr.cpl
access.cpl
appwiz.cpl
desk.cpl
firewall.cpl
hdwwiz.cpl
inetcpl.cpl
intl.cpl
joy.cpl
main.cpl
mmsys.cpl
ncpa.cpl
netsetup.cpl
nusrmgr.cpl
nwc.cpl
odbccp32.cpl
powercfg.cpl
sapi.cpl
sysdm.cpl
telephon.cpl
timedate.cpl
wscui.cpl
wuaucpl.cpl
sapi.cpl

Hope These will save ur time...........

Choosing A Good Domain Name

Choosing A Good Domain Name
---------------------------------------------
Choosing a domain name for your site is one of the most important steps towards creating the perfect internet presence. If you run an on-line business, picking a name that will be marketable and achieve success in search engine placement is paramount. Many factors must be considered when choosing a good domain name. This article summarizes all the different things to consider before making that final registration step!

Short and Sweet
---------------------------------------------
Domain names can be really long or really short (1 - 67 characters). In general, it is far better to choose a domain name that is short in length. The shorter your domain name, the easier it will be for people remember. Remembering a domain name is very important from a marketability perspective. As visitors reach your site and enjoy using it, they will likely tell people about it. And those people may tell others, etc. As with any business, word of mouth is the most powerful marketing tool to drive traffic to your site (and it's free too!). If your site is long and difficult to pronounce, people will not remember the name of the site and unless they bookmark the link, they may never return.

Consider Alternatives
--------------------------------------------
Unless a visitor reaches your site through a bookmark or a link from another site, they have typed in your domain name. Most people on the internet are terrible typists and misspell words constantly. If your domain name is easy to misspell, you should think about alternate domain names to purchase. For example, if your site will be called "MikesTools.com", you should also consider buying "MikeTools.com" and "MikeTool.com". You should also secure the different top level domain names besides the one you will use for marketing purposes ("MikesTools.net", "MikesTools.org", etc.) You should also check to see if there are existing sites based on the misspelled version of the domain name you are considering. "MikesTools.com" may be available, but "MikesTool.com" may be home to a graphic pornography site. You would hate for a visitor to walk away thinking you were hosting something they did not expect.
Also consider domain names that may not include the name of your company, but rather what your company provides. For example, if the name of your company is Mike's Tools, you may want to consider domain names that target what you sell. For example: "buyhammers.com" or "hammer-and-nail.com". Even though these example alternative domain names do not include the name of your company, it provides an avenue for visitors from your target markets. Remember that you can own multiple domain names, all of which can point to a single domain. For example, you could register "buyhammers.com", "hammer-and-nail.com", and "mikestools.com" and have "buyhammers.com" and "hammer-and-nail.com" point to "mikestools.com".
Hyphens: Your Friend and Enemy
-----------------------------------------------
Domain name availability has become more and more scant over the years. Many single word domain names have been scooped up which it makes it more and more difficult to find a domain name that you like and is available. When selecting a domain name, you have the option of including hyphens as part of the name. Hyphens help because it allows you to clearly separate multiple words in a domain name, making it less likely that a person will accidentally misspell the name. For example, people are more likely to misspell "domainnamecenter.com" than they are "domain-name-center.com". Having words crunched together makes it hard on the eyes, increasing the likelihood of a misspelling. On the other hand, hyphens make your domain name longer. The longer the domain name, the easier it is for people to forget it altogether. Also, if someone recommends a site to someone else, they may forget to mention that each word in the domain name is separated by a hyphen. If do you choose to leverage hyphens, limit the number of words between the hyphens to three. Another advantage to using hyphens is that search engines are able to pick up each unique word in the domain name as key words, thus helping to make your site more visible in search engine results.

Dot What?
----------------------------------------------
There are many top level domain names available today including .com, .net, .org, and .biz. In most cases, the more unusual the top level domain, the more available domain names are available. However, the .com top level domain is far and away the most commonly used domain on the internet, driven by the fact that it was the first domain extension put to use commercially and has received incredible media attention. If you cannot lay your hands on a .com domain name, look for a .net domain name, which is the second most commercially popular domain name extension.

Long Arm of the Law
----------------------------------------------
Be very careful not to register domain names that include trademarked names. Although internet domain name law disputes are tricky and have few cases in existence, the risk of a legal battle is not a risk worth taking. Even if you believe your domain name is untouchable by a business that has trademarked a name, do not take the chance: the cost of litigation is extremely high and unless you have deep pockets you will not likely have the resources to defend yourself in a court of law. Even stay away from domain names in which part of the name is trademarked: the risks are the same.

Search Engines and Directories
----------------------------------------------
All search engines and directories are different. Each has a unique process for being part of the results or directory listing and each has a different way of sorting and listing domain names. Search engines and directories are the most important on-line marketing channel, so consider how your domain name choice affects site placement before you register the domain. Most directories simply list links to home pages in alphabetical order. If possible, choose a domain name with a letter of the alphabet near the beginning ("a" or "b"). For example, "aardvark-pest-control.com" will come way above "joes-pest-control.com". However, check the directories before you choose a domain name. You may find that the directories you would like be in are already cluttered with domain names beginning with the letter "a". Search engines scan websites and sort results based on key words. Key words are words that a person visiting a search engine actually search on. Having key words as part of your domain name can help you get better results.

Movie Formats::DVD Rip and many more

CAM:-
------------------------------------------
A cam is a theater rip usually done with a digital video camera. A mini tripod is sometimes used, but a lot of the time this wont be possible, so the camera make shake. Also seating placement isn't always idle, and it might be filmed from an angle. If cropped properly, this is hard to tell unless there's text on the screen, but a lot of times these are left with triangular borders on the top and bottom of the screen. Sound is taken from the onboard microphone of the camera, and especially in comedies, laughter can often be heard during the film. Due to these factors picture and sound quality are usually quite poor, but sometimes we're lucky, and the theater will be fairly empty and a fairly clear signal will be heard.

TELESYNC (TS):-
------------------------------------------
A telesync is the same spec as a CAM except it uses an external audio source (most likely an audio jack in the chair for hard of hearing people). A direct audio source does not ensure a good quality audio source, as a lot of background noise can interfere. A lot of the times a telesync is filmed in an empty cinema or from the projection booth with a professional camera, giving a better picture quality. Quality ranges drastically, check the sample before downloading the full release. A high percentage of Telesyncs are CAMs that have been mislabeled.

TELECINE (TC):-
------------------------------------------
A telecine machine copies the film digitally from the reels. Sound and picture should be very good, but due to the equipment involved and cost telecines are fairly uncommon. Generally the film will be in correct aspect ratio, although 4:3 telecines have existed. A great example is the JURASSIC PARK 3 TC. TC should not be confused with TimeCode , which is a visible counter on screen throughout the film.

SCREENER (SCR):-
------------------------------------------
A pre VHS tape, sent to rental stores, and various other places for promotional use. A screener is supplied on a VHS tape, and is usually in a 4:3 (full screen) a/r, although letterboxed screeners are sometimes found. The main draw back is a "ticker" (a message that scrolls past at the bottom of the screen, with the copyright and anti-copy telephone number). Also, if the tape contains any serial numbers, or any other markings that could lead to the source of the tape, these will have to be blocked, usually with a black mark over the section. This is sometimes only for a few seconds, but unfortunately on some copies this will last for the entire film, and some can be quite big. Depending on the equipment used, screener quality can range from excellent if done from a MASTER copy, to very poor if done on an old VHS recorder thru poor capture equipment on a copied tape. Most screeners are transferred to VCD, but a few attempts at SVCD have occurred, some looking better than others.
DVDRip:-
-------------------------------------------
A copy of the final released DVD. If possible this is released PRE retail (for example, Star Wars episode 2) again, should be excellent quality. DVDrips are released in SVCD and DivX/XviD.

VHSRip:-
-------------------------------------------
Transferred off a retail VHS, mainly skating/sports videos and XXX releases.

WORKPRINT (WP):-
-------------------------------------------
A workprint is a copy of the film that has not been finished. It can be missing scenes, music, and quality can range from excellent to very poor. Some WPs are very different from the final print (Men In Black is missing all the aliens, and has actors in their places) and others can contain extra scenes (Jay and Silent Bob) . WPs can be nice additions to the collection once a good quality final has been obtained.

DivX Re-Enc:-
--------------------------------------------
A DivX re-enc is a film that has been taken from its original VCD source, and re-encoded into a small DivX file. Most commonly found on file sharers, these are usually labeled something like Film.Name.Group(1of2) etc. Common groups are SMR and TND. These aren't really worth downloading, unless you're that unsure about a film u only want a 200mb copy of it. Generally avoid.
Formats
VCD:-
--------------------------------------------
VCD is an mpeg1 based format, with a constant bitrate of 1150kbit at a resolution of 352x240 (NTCS). VCDs are generally used for lower quality transfers (CAM/TS/TC/Screener(VHS)/TVrip(analogue) in order to make smaller file sizes, and fit as much on a single disc as possible. Both VCDs and SVCDs are timed in minutes, rather than MB, so when looking at an mpeg, it may appear larger than the disc capacity, and in reality u can fit 74min on a CDR74.

SVCD:-
--------------------------------------------
SVCD is an mpeg2 based (same as DVD) which allows variable bit-rates of up to 2500kbits at a resolution of 480x480 (NTSC) which is then decompressed into a 4:3 aspect ratio when played back. Due to the variable bit-rate, the length you can fit on a single CDR is not fixed, but generally between 35-60 Mins are the most common. To get a better SVCD encode using variable bit-rates, it is important to use multiple "passes". this takes a lot longer, but the results are far clearer.

XVCD/XSVCD:-
--------------------------------------------
These are basically VCD/SVCD that don't obey the "rules". They are both capable of much higher resolutions and bit-rates, but it all depends on the player to whether the disc can be played. X(S)VCD are total non-standards, and are usually for home-ripping by people who don't intend to release them.


DivX / XviD:-
---------------------------------------------
DivX is a format designed for multimedia platforms. It uses two codecs, one low motion, one high motion. most older films were encoded in low motion only, and they have problems with high motion too. A method known as SBC (Smart Bit-rate Control) was developed which switches codecs at the encoding stage, making a much better print. The format is Ana orphic and the bit-rate/resolution are interchangeable. Due to the higher processing power required, and the different codecs for playback, its unlikely we'll see a DVD player capable of play DivX for quite a while, if at all. There have been players in development which are supposedly capable, but nothing has ever arisen. The majority of PROPER DivX rips (not Re-Encs) are taken from DVDs, and generally up to 2hours in good quality is possible per disc. Various codecs exist, most popular being the original Divx3.11a and the new XviD codecs.

DVD-R:-
--------------------------------------------
Is the recordable DVD solution that seems to be the most popular (out of DVD-RAM, DVD-R and DVD+R). it holds 4.7gb of data per side, and double sided discs are available, so discs can hold nearly 10gb in some circumstances. SVCD mpeg2 images must be converted before they can be burnt to DVD-R and played successfully. DVD>DVDR copies are possible, but sometimes extras/languages have to be removed to stick within the available 4.7gb.

MiniDVD:-
---------------------------------------------
MiniDVD/cDVD is the same format as DVD but on a standard CDR/CDRW. Because of the high resolution/bit-rates, its only possible to fit about 18-21 mins of footage per disc, and the format is only compatible with a few players.

All About Bandwidth

This is well written explanation about bandwidth, very useful info.

BandWidth Explained
Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.
...Network Connectivity...
The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location. It is the size of each network connection that determines how much bandwidth is available. For example, if you use a DSL connection to connect to the internet, you have 1.54 Mega bits (Mb) of bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are grouped in bytes which form words, text, and other information that is transferred between your computer and the internet.
If you have a DSL connection to the internet, you have dedicated bandwidth between your computer and your internet provider. But your internet provider may have thousands of DSL connections to their location. All of these connection aggregate at your internet provider who then has their own dedicated connection to the internet (or multiple connections) which is much larger than your single connection. They must have enough bandwidth to serve your computing needs as well as all of their other customers. So while you have a 1.54Mb connection to your internet provider, your internet provider may have a 255Mb connection to the internet so it can accommodate your needs and up to 166 other users (255/1.54).


...Traffic...
A very simple analogy to use to understand bandwidth and traffic is to think of highways and cars. Bandwidth is the number of lanes on the highway and traffic is the number of cars on the highway. If you are the only car on a highway, you can travel very quickly. If you are stuck in the middle of rush hour, you may travel very slowly since all of the lanes are being used up.
Traffic is simply the number of bits that are transferred on network connections. It is easiest to understand traffic using examples. One Gigabyte is 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024 megabytes. To put this in perspective, it takes one byte to store one character. Imagine 100 file cabinets in a building, each of these cabinets holds 1000 folders. Each folder has 100 papers. Each paper contains 100 characters - A GB is all the characters in the building. An MP3 song is about 4MB, the same song in wav format is about 40MB, a full length movie can be 800MB to 1000MB (1000MB = 1GB).
If you were to transfer this MP3 song from a web site to your computer, you would create 4MB of traffic between the web site you are downloading from and your computer. Depending upon the network connection between the web site and the internet, the transfer may occur very quickly, or it could take time if other people are also downloading files at the same time. If, for example, the web site you download from has a 10MB connection to the internet, and you are the only person accessing that web site to download your MP3, your 4MB file will be the only traffic on that web site. However, if three people are all downloading that same MP at the same time, 12MB (3 x 4MB) of traffic has been created. Because in this example, the host only has 10MB of bandwidth, someone will have to wait. The network equipment at the hosting company will cycle through each person downloading the file and transfer a small portion at a time so each person's file transfer can take place, but the transfer for everyone downloading the file will be slower. If 100 people all came to the site and downloaded the MP3 at the same time, the transfers would be extremely slow. If the host wanted to decrease the time it took to download files simultaneously, it could increase the bandwidth of their internet connection (at a cost due to upgrading equipment).
...Hosting Bandwidth...
In the example above, we discussed traffic in terms of downloading an MP3 file. However, each time you visit a web site, you are creating traffic, because in order to view that web page on your computer, the web page is first downloaded to your computer (between the web site and you) which is then displayed using your browser software (Internet Explorer, Netscape, etc.) . The page itself is simply a file that creates traffic just like the MP3 file in the example above (however, a web page is usually much smaller than a music file).
A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for CNN.com is about 200KB (200 Kilobytes = 200,000 bytes = 1,600,000 bits). This is typically large for a web page. In comparison, Yahoo's home page is about 70KB.

...How Much Bandwidth Is Enough?...
It depends (don't you hate that answer). But in truth, it does. Since bandwidth is a significant determinant of hosting plan prices, you should take time to determine just how much is right for you. Almost all hosting plans have bandwidth requirements measured in months, so you need to estimate the amount of bandwidth that will be required by your site on a monthly basis
If you do not intend to provide file download capability from your site, the formula for calculating bandwidth is fairly straightforward:
Average Daily Visitors x Average Page Views x Average Page Size x 31 x Fudge Factor
If you intend to allow people to download files from your site, your bandwidth calculation should be:
[(Average Daily Visitors x Average Page Views x Average Page Size) +(Average Daily File Downloads x Average File Size)] x 31 x Fudge Factor
Let us examine each item in the formula:
Average Daily Visitors - The number of people you expect to visit your site, on average, each day. Depending upon how you market your site, this number could be from 1 to 1,000,000.
Average Page Views - On average, the number of web pages you expect a person to view. If you have 50 web pages in your web site, an average person may only view 5 of those pages each time they visit.
Average Page Size - The average size of your web pages, in Kilobytes (KB). If you have already designed your site, you can calculate this directly.
Average Daily File Downloads - The number of downloads you expect to occur on your site. This is a function of the numbers of visitors and how many times a visitor downloads a file, on average, each day.
Average File Size - Average file size of files that are downloadable from your site. Similar to your web pages, if you already know which files can be downloaded, you can calculate this directly.
Fudge Factor - A number greater than 1. Using 1.5 would be safe, which assumes that your estimate is off by 50%. However, if you were very unsure, you could use 2 or 3 to ensure that your bandwidth requirements are more than met.
Usually, hosting plans offer bandwidth in terms of Gigabytes (GB) per month. This is why our formula takes daily averages and multiplies them by 31.

All About Internet

The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.
No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.
All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.
An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.
The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.
--------------------------------------------------------------------------------
COMPONENTS OF THE INTERNET:-

WORLD WIDE WEB
The World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.
The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.
The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.
Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.
The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.
The Web provides a vast array of experiences including multimedia presentations, real-time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.
--------------------------------------------------------------------
E-MAIL
Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.
A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program. Many e-mail programs, including Eudora, Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.
---------------------------------------------------------------
TELNET
Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers (140.147.254.3). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.
Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.
With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.
-----------------------------------------------------------------
FTP
FTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.
If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.
FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as FtpFind, located at /http://www.ftpfind.com/. This option is easiest because you do not need to know FTP program commands.
------------------------------------------------------------------
E-MAIL DISCUSSION GROUPS
One of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.
A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e-mail account to participate in a listserv discussion group. Visit Tile.net at /http://tile.net/ to see an example of a site that offers a searchablecollection of e-mail discussion groups.
Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.
--------------------------------------------------------------- USENET NEWS
Usenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e-mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.
Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.
There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer-related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.
The Usenet newsfeed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.

Reasons Why PC's Crash

Reasons for the system crash.........
--------------------------------------------------------------------
1 Hardware conflict
The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.
For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.
If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:
* Start-Settings-Control Panel-System-Device Manager.
Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.
Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.
Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).
When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.
To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.
-----------------------------------------------------------------------
2 Bad Ram
Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.
But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.
One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.
Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.
EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.
----------------------------------------------------------------------
3 BIOS settings
Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.
Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.
A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.
Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).
-----------------------------------------------------------------------
4. Hard disk drives
After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to
* Start-Programs-Accessories-System Tools-Disk Defragmenter
This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.
The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).
Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to
* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.
Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.
Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to
* Start-Programs-Accessories-System Tools-ScanDisk
Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.
---------------------------------------------------------------
5 Fatal OE exceptions and VXD errors
Fatal OE exception errors and VXD errors are often caused by video card problems.
These can often be resolved easily by reducing the resolution of the video display. Go to
* Start-Settings-Control Panel-Display-Settings
Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.
If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to
* Start-Settings-Control Panel-System-Device Manager
Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.
If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.
The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.
Another useful way to resolve video problems is to go to
* Start-Settings-Control Panel-System-Performance-Graphics
Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).
Look up your video card's manufacturer on the internet and search for the most recent drivers for it.
--------------------------------------------------------------
6 Viruses
Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to
* Start-Settings-Control Panel-Add/Remove Programs
Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.
A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.
An excillent anti-virus programme is kaspersky.Like Norton,it doesnt slow down your system......
-------------------------------------------------------------
7 Printers
The action of sending a document to print creates a bigger file, often called a postscript file.
Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.
If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.
--------------------------------------------------------------
8 Overheating
Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.
One remedy is to get a bigger better fan and install it on top of the CPU.
CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.
----------------------------------------------------------
9 Power supply problems
With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.
If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.
It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

Sunday, April 6, 2008

Shutdown Tricks

In Windows,You can shut down your system just by writing a command in run dialog box or at command prompt.You can create your own short cut which on clicking shuts down the system.
All you need to do is... right-click on an empty Desktop spot -> select New -> Shortcut -> type shutdown followed by a space, and then enter one or more of the parameters listed below -> click Next -> type a suggestive name for your new shortcut -> finally, click Finish.
This is the Shutdown.exe (located in %systemroot%\System32, usually C:\Windows\System32) syntax:
shutdown [-l/-s/-r/-a] [-f] [-m \\computername] [-t xx] [-c "Text"] [-d[u][p]:xx:yy]
Valid command line switches:
-a = Abort system shutdown in progress ONLY IF the -t xx timeout option was already set to ANY value other than 0. ALL switches except -l and -m are ignored during abort.
-c "Text" = Text comment (case insensitive) to be displayed in the Message area of the System Shutdown window. MUST be enclosed between quotes. Maximum allowed 127 ASCII characters.
-d [u][p]:xx:yy = Reason code for shutdown:u = User code.p = Planned shutdown code.xx = Major reason code. Positive integer number less than 256.yy = Minor reason code. Positive integer number less than 65536.
-f = Force running applications to close without warning.
-i = Display the shutdown interface (GUI). MUST be the first option!
-l = Log off the current user of the local computer (default action). Can NOT be used with the -m option unless the current user has Sysadmin rights, in which case the -m switch takes precedence.
-m \\computername = Remote/network computer name (most always case sensitive) to log off/restart/shut down. Current user MUST have Sysadmin rights to be allowed to use this switch!
-s = Shut down the local computer.
-r = Shut down and restart (reboot) the local computer.
-t xx = Set shutdown timer to timeout for xx seconds. IF NOT specified defaults to 20 seconds. Allowed values between 0 and 99 seconds. The -a switch is the ONLY one that CAN be used during the timeout period.
For example:
shutdown -s -c "Shutting down!" -t 3
tells your computer to shutdown after waiting for 3 seconds while the System Shutdown window will display text above in the Message area.

PassWord Recovery

In case of a User's Password loss

1> Boot the PC in Safe Mode by pressing the F8 key when starting your computer.
2> Select the Safe Mode option. You can now Login as an Administrator and XP won't prompt for the Password.What u have to do is to access the SAM directory file.The access cant be done directly.
3> Try rebooting the PC in DOS.
4> Now, Access to C:\Windows\system32\config\SAM.
5> Rename SAM as SAM.mj.
6> Now XP won't ask for Password next time you Login.
7> Now, again go to Start menu --> Run.
8> Type there cmd prompt.
9> Type net user *. It will list all the users.
10> Again type net user "administrator" or the name of the administrator "name" *.
11> It will ask for the Password. Type the Password and there you are done.
12> Hold the Ctrl+Alt key and press Del twice. This will bring up the normal login and you can log on as Administrator. To unhide the Administrator account so it does show up.
13> Again go to Start --> Run --> regedit.
14> Go to HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows NT/ CurrentVersion/Winlogon/SpecialAccounts/UserList.
15> Unhide the Administrator key by giving it a value of 1

And you are done...

Various Software Interrupts

Below are some of the BIOS Interrupts which might be useful in troubleshooting.....

Address(Hex) Interrupt Value Function
0000 00H Divide-by-zero intrr
0008 02H Non-maskable interr
000C 03H Breakpoint
0010 04H Arithmetic overflow
0014 05H Print screen
0018 06H Reserved
001C 07H Reserved
0020 08H Timer interrupt
0024 09H Keyboard service
0028 0AH VGA retrace
002C 0BH Serial port 2
0030 0CH Serial port 1
0034 0DH Hard disk
0038 0EH Floppy disk
003C 0FH Parallel port
0040 10H Video services
0044 11H Equipment check
0048 12H Memory size check
004C 13H Floppy and hard disk
0050 14H RS-232 service
0054 15H System services
0058 16H Keyboard
005C 17H Printer I/O
0060 18H Basic ROM entry point
0064 19H Initial Program Load
0068 1AH Time of day
006C 1BH Keyboard break
0070 1CH User timer
0074 1DH Monitor ROM pointer
007C 1FH Character generator
0088 22H DOS terminate address
008C 23H DOS Ctrl+Break exit
0090 24H DOS fatal error exit
0094 25H DOS absolute disk read
0098 26H DOS absolute disk write
009C 27H DOS Terminate
00A0 28H DOS idle loop
00A4 29H DOS console device
00A8 2AH DOS network
00B8 2EH DOS execute command
00BC 2FH DOS print spool control
00CC 33H Mouse driver calls
00FC 3FH LINK (internal use)
0100 40H Floppy and hard disk
0104 41H Pointer to hdd
0108 42H EGA video screen BIOS
010C 43H EGA initialize
0100 44H EGA graphics patterns
0114 45H Reserved
0118 46H Pointer to disk
011C 47H Reserved
0120 48H PCjr cordless keyboard
0124 49H PCjr non-keyboard scan

The interrupt vectors are stored in the RAM of your computer so that the values in the table can be changed. For example, a program or software driver may want to alter or update a BIOS routine to take advantage of a special feature of new hardware you install in your computer. The BIOS code itself loads default values for many of these interrupt vectors into the appropriate RAM locations with the vectors pointing at the routines stored in your computer's ROM.

CISCO Q&A

QUESTION NO: 1
A packet that needs to be forwarded arrives on an interface of a router. In order for a router to route data, what must that router determine? (Select the best answer)
A. The route age of the next-hop device
B. The subnet mask of the source network
C. The cost metric of the path of the destination
D. The outbound interface of the best path to the destination
E. All of the above

Answer: D
==========================================
QUESTION NO: 2
A new router is being installed into an existing network, and the routing table is being built for the first time on this network. Which of the following statements is true regarding the routing tables on a Cisco router?
A. Entries are listed in the order of the route cost metric.
B. Only the active link is shown for load-balanced routers.
C. Privileged EXEC mode is required to view the routing table.
D. The clear ip route * command refreshes the entire routing table.
E. All of the above are true.

Answer: C
========================================
QUESTION NO: 3
Which of the following phrases is the correct term for what happens to a network when a topology change causes all the routers to synchronize their routing tables?
A. Flooding
B. Broadcasting
C. Convergence
D. Summarization
E. None of the above

Answer: C
==============================================
QUESTION NO: 4
What is the purpose of configuring a router with the “IP Helper address” command?
A. IP Helper is used to direct BOOTP clients to a BOOTP server.
B. IP Helper is used to prevent the router form forwarding IP broadcasts.
C. IP Helper is used to allow IPX clients to communicate with IP-based servers.
D. IP Helper is used to accommodate compatibility routers using different IP routingprotocols.

Answer: A
===================================
QUESTION NO: 5
On router TK1 the command “ip helper address” is already configured. Which of the following commands would you use if you wanted to send SNMP broadcast packets off to a specific server?
A. ip server udp 161
B. ip helper-protocol 161
C. ip forward-protocol 161
D. ip directed-broadcast 161
E. ip forward snmp

Answer: C
==========================================
QUESTION NO: 6
When you execute the “ip helper-address” command on a router, which three UDP ports get enabled automatically by default? (Select three)
A. 53 (DNS)
B. 69 (TFTP)
C. 515 (LPR)
D. 161 (SNMP)
E. 49 (TACACS)

Answer: A, B, E
=============================================
QUESTION NO: 7
Which administrative distance is given to EIGRP summary routes?
A. 0
B. 1
C. 5
D. 90
E. 95
F. 150

Answer: C
==========================================
QUESTION NO: 8
You are determining the routing protocol to use throughout your network. In doing thisvyou compare the advantages of classless and classful protocols. Which of the following statements are true regarding classless routing protocols?
A. A default gateway is required.
B. Variable-length subnet masks are not supported.
C. Routers are automatically summarized to class boundaries.
D. Networks with different subnet masks can exist in the same address class.
E. All of the above

Answer: D
============================================
QUESTION NO: 9
Which two of the following describe advantages of implementing a classless routing protocol, when compared to a classful routing protocol?
A. Support for VLSM.
B. Support for FLSM.
C. Summarization of discontinuous subnets.
D. Auto-summarization across network boundaries.
E. The ip classless command improves convergence time.

Answer: A, C
========================================
QUESTION NO: 10
You wish to use a classless IP routing protocol within your network. Which of the following classless routing protocols could you use? (Select all that apply)
A. IS-IS
B. IGRP
C. RIPv1
D. OSPF
E. EIGRP

Answer: A. D, E
==============================
QUESTION NO: 11
When comparing and contrasting the differences between classless and classful routing protocols, which of the following is true?
A. In a classful system, a router uses a bit mask to determine the network and host portions of an address and there is no class restriction.
B. In a classless system, a router determines the class of an address and then identifies thenetwork and host octets based on that class.
C. In a classful system, subnet mask information is maintained and passed along with eachrouting update.
D. In a classless system, when a routing update is received about a different major networkas configured on the receiving interface, the default subnet mask is applied.
E. In a classful system, when a routing update is received about the same major network asconfigured on the receiving interface, the router applies the subnet mask configured onthe receiving interface.

Answer: E
==========================================
QUESTION NO: 12
The Bellman-Ford algorithm is used by the grand majority of distance vector routing protocols in calculating routes. One sophisticated routing protocol doesn’t use this algorithm; instead it uses the DUAL (diffusing update algorithm). Which of the following routing protocols is it?
A. IGRP
B. OSPF
C. EIGRP
D. RIP v.2
E. RIP v.1

Answer: C
===============================================
QUESTION NO: 13
With regards to RIP version 1 networks, which of the following two statements are true?(Choose two)
A. RIP v.1 route updates have a subnet mask field.
B. RIP v.1 networks are known as classful networks.
C. RIP v.1 networks are known as classless networks.
D. RIP v.1 route updates do not have a subnet mask field.

Answer: B, D
================================================
QUESTION NO: 14
In an effort to increase network security, RIP routing authentication is being configured on a network. Which of the following types of authentication does RIPv2 support?
A. MD5 only
B. PAP and CHAP
C. clear text and PAP
D. clear text and MD5
E. MD5 and CHAP

Answer: D
==============================
QUESTION NO: 15
OSPF and IS-IS are examples of link state protocols. Which two features are characteristics of link-state routing protocols? (Choose two)
A. Link-state protocols are based on the Dijkstra algorithm.B. Any incremental updates contain the full routing table.C. Link-state protocols flood the area with LSAs when a network change occurs.D. Routing updates are broadcast to neighbors.E. Link-state protocols use split-horizon updates to avoid routing loops.

Answer: A, C
==========================================
QUESTION NO: 16
When an administrator uses VLSM to subnet a network address, which of the followingrules must be adhered to? (Select three)
A. A subnet is made up of all aggregated routes.
B. A subnet can address hosts, or be further subnetted.
C. A routing protocol must carry the subnet mask in updates.
D. Summarized networks must have the same high-order bits.

Answer: B,C,D
========================================================
QUESTION NO: 17
The Testking network is migrating to a classless routing protocol to support VLSM. Which two of the statements below correctly describe features of Variable Length Subnet Masking (VLSM)? (Select two)
A. It supports IP version 4 and 6.
B. It accommodates overlapping address ranges.
C. It allows for better route summarization within routing tables.
D. It allows subnetworks to be further divided into smaller subnets.

Answer: C, D
=========================================
QUESTION NO: 18
The CTO of TestKing INC. has called a meeting with all the system administrators to update them on the latest expansion plan of establishing multiple remote offices, andconnecting those remote offices to the central office by a WAN. Management is insistingthat an addressing scheme using VLSM be used, and they need six useable host addressesat each remote location. Assuming that TestKing is using a class C IP range, which variablelength subnet mask should be used to support the 6 hosts at each location?
A. /24
B. /28
C. /29
D. /30
E. /31
F. /32

Answer: C
========================================
QUESTION NO: 19
You’re boss has assigned you the difficult task of subnetting a Class B network, so you choose 172.29.100.0/28. Which of the following answer choices reflect a valid VLSM subnetthat can be obtained from your Class B network?
A. 172.29.100.8
B. 172.29.100.32
C. 172.29.100.60
D. 172.29.100.104
E. 172.29.100.126

Answer: B
======================================
QUESTION NO: 20
TestKing is using the private IP address range of 192.168.100.0/24 for use on all of the WAN links. If this network is divided using a /30 mask, how many total WAN subnets can be supported?
A. 14
B. 30
C. 62
D. 126
E. 254

Answer: C
==================================
QUESTION NO: 21
You’ve secured the subnet and mask of 186.37.100.0/26 to use for some of your companiesremote offices. Which VLSM mask below could provide you with six useable host addresses in each branch subnet?
A. /24
B. /28
C. /29
D. /30
E. /31
F. None of the above

Answer: C

Speed Up Adobe Reader

Well opening a pdf file in adobe acrobat reader takes an initial time which is sometimes very much irritating.So,to reduce the time,what u do is:
Move to the folder:"C:\Program Files\Adobe\Acrobat 7.0\Reader\plug_ins"Select all the plugins and cut them.Paste them all in the optional folder in "Reader".By doing this,you have removed all the plugins.
But remember,Do this only if acrobat reader is closed.
The plugins you remove also contains the search plugin.So this may disable the search option in the reader while searching the keyword.So,dont delete the search plugin.

Speeding Up Win XP

Well,to speed up your win xp,here are some of the tips:
1> Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS.
2> You can disable the file indexing option.The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index."This process takes a lot of time..So,what u do is,First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.
3> Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS.
4> Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.
5> In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.
6> Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts also arises.
7> Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations.
8> Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.
9> Download all the latest updates from the microsoft site.Make sure to update your anti-virus program to remove the spywares and viruses.
10> Try to stick to minimum number of partitions as windows runs efficiently on single partitioned hdd.

BIOS

...Understanding BIOS...
BIOS of your computer is always present with your system.You can say it's omnipresent.Basic Input Output System is something like without which your computer can't live.The definitions of the computer are given by the BIOS only.It is the thing which knows how to keep your system in line.It holds the most of the secrets of your computer.A lot of things are to be tested when the system turns on.This job is done by the BIOS itself(..behind the screens..).Windows always tries its best to lock it up,but BIOS is smart enough to work in backgrounds as well..
The BIOS is, in fact, the one essential constituent that distinguishes one computer from another, even when they both share the same microprocessor, motherboard, and support hardware.
...Now comes the point of FIRMWARE...
Strictly speaking, however, the BIOS isn't hardware at all, even though it is an essential part of your computer's hardware. The BIOS is special program code that's permanently encapsulated in ROM chips or, as is most often the case with newer computers, Flash memory. Because of the two-sided aspects of the BIOS, existing between hardware and software, it and other pieces of program code encapsulated in ROM or Flash memory are often termed "Firmware".
The importance of the BIOS arises from its function. The BIOS tests your computer every time you turn it on. It may even allocate your system's resources for you automatically, making all the adjustments necessary to accommodate new hardware. It also determines the compatibility of your computer with both hardware and software and can even determine how flexible your computer is in setup and use.
If some computer-maker wanted to, it could put the entire operating system and application software into the Firmware. Some portable computers actually came close... Early Hewlett-Packard Omnibook,sub-notebook,computers packed Windows and part of Microsoft Office into their ROMs. Of course, these machines are not very useful any more.The storing capacity of the required software would fill more chips than u could carry,of course,comfortably.As we know,ROM chips have few kilobytes of memory to store.It can't store a huge software of many Gigabytes...
...Functions...
BIOS has various operations to perform.It has routines that allows the computer software to take the responsibility of its hardware.Also it checks,which new expansion boards have been installed.It also ensures that the newly installed hardware may not interfere with the previously installed peripherals and hardware components.
First of all,what it does is,instructs the microprocessor to check the previously installed hardware components whether they are functioning properly or not.If they are,it then instructs the processor to check the newly installed hardware.
When the microprocessor runs out of add-in peripherals, it begins the actual bootup process, which is the Initial Program Load (IPL). The BIOS code tells the microprocessor to jump to a section of code that tells the chip how to read the first sector of your floppy or hard disk. Program code then takes over from the BIOS and tells the microprocessor how to load the operating system from the disk to start the computer running.
With Windows, however, the BIOS gets pushed out of the way. After the BIOS has assured the operating integrity of your system, Windows takes over. First, the operating system starts loading its own boot code. Then, it installs drivers that take over the various interface functions of the BIOS, one by one.
The operating system replaces the BIOS interface routines for several reasons. Because software drivers load into RAM, they are not limited in the amount of space available for their code. Software drivers also extend the capabilities, whereas the BIOS limits them. Using only the BIOS, your computer cannot do anything that the BIOS does not know about. It enables you to use the wide variety of peripherals you're apt to connect to your computer. Moreover, because the BIOS is designed to run at bootup when your computer is in real mode, it uses only real-mode code, with all the limitations that implies (in particular, a total address space of 1MB). Software drivers can (and nowadays invariably do) run in protected mode. Not only can they access more memory, but protected mode drivers can be written in 32-bit code that executes faster on modern microprocessors.
The BIOS starts to work as soon as you switch your system on. When all modern Intel microprocessors start to work, they immediately set themselves up in real mode and look at a special memory location that is exactly 16 bytes short of the top of the 1MB real-mode addressing range—absolute address 0FFFF0(hex). This location holds a special program instruction, a jump that points to another address where the BIOS code actually begins.
...Power-On Self Test...
POST(Power-On Self Test) comes into play as soon as the system starts.It checks whether everything is functioning well or not.
...Error Codes...The BIOS tests are relatively simple. The BIOS sends data to a port or register and then looks to see the results. If it receives expected results, the BIOS assumes all is well. If it finds a problem, however, it reports the failure. If the display system is working, it posts an error-code number on your monitor screen.If your computer is so ill that the display system will not even work, the BIOS sends out a coded series of beeps through your system's loudspeaker.This doesn't mean that your system is not working well.Displaying the code on the screen proves that at least one of the components is working well...These errors are palyed via sounds.
...Initial Program Load...
After all the testings,it sends the control to the operating system which in turn gives life to the system.This transfer is called Initial Program Load.
...Storage Functions...
Because the BIOS comes in the physical form of ROM chips, its storage functions should not be surprising. For example, the BIOS stores its own name and the date it was written inside its own code. But the BIOS also incorporates storage functions that go beyond the bytes encapsulated in its ROM silicon. Although physically separate from the BIOS chips themselves, the setup memory of your computer is controlled by BIOS functions and is often considered with—and even as part of—the BIOS. This memory records vital details about your computer hardware so that you don't have to set up each expansion board and disk drive every time you switch on your computer. In addition, the BIOS tells your computer to reserve several small blocks of memory for dynamic data that your computer and its operating system use for tracking several system functions.

...CMOS...
When the world and computers were young, all the differences between computers could be coded by one or two banks of DIP switches. But as the options began to pile up, the switch proved to be more a problem than a panacea. A reasonable number of switches couldn't allow for the number of options possible in a modern computer. Another problem with switches is that they are prone to mechanical problems—both of their own making and otherwise. Switch contacts naturally go bad, and they can be helped along the path of their own destruction by people who attempt to adjust them with pencils (the graphite that scrapes off the point is conductive and can short out the switches). People often set switches wrong and wonder what is awry.
...Resetting CMOS...
The chief reason you're advised not to tinker with the advanced settings of your computer's BIOS is that the control they afford allows you to set your computer up so that it does not work. For example, if you err by setting too few wait states for the memory you have installed in your computer, you may encounter a memory error as soon as your computer switches on and checks its BIOS settings. You won't have an opportunity to jump back into setup to fix the problem. You'll be stuck with a dead computer and have no way of bringing it back to life.
Well, not quite. Most computer BIOSs have factory defaults that are set conservatively enough that the machine will operate with whatever you've installed. The only trick is to restore the factory defaults.
...Switch or Jumper Reset...
Many computers have jumpers or a DIP switch that forces the reset. Check the documentation of your computer or motherboard to see if this option is available to you. Typically you'll find this information using the index of your instruction manual and looking under "factory defaults" or "BIOS defaults."
The exact procedure usually takes one of two forms, depending on the design of your computer. The easiest requires only that you move a jumper or slide a DIP switch and then turn your computer back on. The position of the switch or jumper doesn't matter. All that counts is that you move it. The most complicated procedure isn't much more difficult. You move the jumper or slide the switch, wait a few minutes, and then move it back. The delay allows the tiny amount of power that's locked in the CMOS circuitry to drain away.

...Power Deprivation...
The alternate procedure for resetting your CMOS works for nearly every computer and is based on the same power-depravation principle. You only need to deprive your computer's CMOS of its battery power so that the contents of its memory evaporate. Exactly how to deprive your CMOS of its lifeblood electricity depends on the design of your system.
If your computer's motherboard uses an external battery, simply unplug it from the motherboard. If your computer uses a replaceable disc-style battery in a matching battery holder, pop the battery out. In either case, allow ten minutes for the residual power in the CMOS to drain away before reconnecting or reinstalling the battery.
Some motherboards use permanently installed rechargeable nickel-cadmium batteries instead of replaceable cells. Usually these computers have some provision for electrically disconnecting the battery power from the CMOS. A few computer motherboards make no provision for disconnecting their nickel-cadmium batteries (also known as ni-cads). If you have such a computer and have put your BIOS in a nonfunctional configuration, as a last resort you can sometimes force a reset to the factory defaults by discharging the battery. The battery will recharge the next time you operate your computer.
Never short out a nickel-cadmium battery to discharge it. The low resistance of ni-cad cells produces high currents (even with small batteries), sufficient to melt circuit board traces and even set your computer on fire. Instead of shorting out the battery, discharge it through a resistor. A half-watt, 39-ohm resistor will safely discharge a ni-cad cell in about half an hour without danger to you or your computer. Alternately, you can use a six-volt lamp, such as one designed for battery-powered lanterns, as a battery load. The lamp will show you the progress of the discharge, glowing brightly at first and dimming as the battery's charge gets drained away. Connect either the resistor or the lamp directly between the terminals of the battery using clip leads.
...Bus Clock...
Many ISA systems allow you to adjust the clock speed of their expansion buses so that you can eke the most performance from your old expansion boards. Some systems give you a choice of clock speeds in megahertz; others express the speed in terms of the microprocessor clock (for example, CLOCKIN/4 implies one-quarter the microprocessor clock speed—8.25MHz with a 33MHz system). Higher speeds (lower divisors) can deliver more performance, but rates above about 12MHz may sacrifice reliability. In VL Bus and PCI systems, the bus clock setting has less effect on overall performance because the devices that need the most bus bandwidth (that is, a faster bus speed) will be connected to the higher-speed local bus. The clock speed of the local bus is not affected by the bus clock setting.
That's all for this section.Being somewhat brief,most of the essential components have been covered.

Registry

Well,editing Registry is not like an ice on a piece of cake.It needs a lot of understanding,its key concepts and much more.So,a brief introduction is necessary to understand its keys and subkeys which are as under::

1.HKEY_USERS
It contains at least three subkeys:
.DEFAULT::It contains the settings which the Windows uses to display its initial desktop before the user logs in.
.SID::This key contains the Desktop Settings and Control Panel settings. .SID_Classes::This key contains the user class registrations and file associations.

2.HKEY_CURRENT_USER
It contains Desktop settings, network connections, printers, and application preferences. Some of this root key's subkeys are::
AppEvents::It links the sounds to various desktop settings such as opening or closing of events
Console:: It hosts all character-mode applications of course, including the MS-DOS command prompt.
Control Panel:: It controls the accessibility, regional, and desktop appearance settings.
Identities::It Contains one subkey for each identity in Microsoft Outlook Express. Outlook Express uses identities to allow multiple users to share a single mail client.
Keyboard Layout::It contains the information of installed keyboard layouts.
Printers::It contains the preferences for computers.
Software::Most of the configurations are stored in this key itself.

3.HKEY_LOCAL_MACHINE
This key contains the settings which apply to each and every user who logs in.
It contains the following subkeys:
HARDWARE:: It Stores the data which describes the hardware that Windows XP detects as it starts.
SAM::This key contains the data of local security.Windows stores the local users and groups in this key only.Even the administrator can't access this key while running the windows
SECURITY::It contains the security data as well as the security settings.

4.HKEY_CLASSES_ROOT
It contains two types of settings:
1.File associations that links different types offiles with the programs that can open, print, and edit them.
2.Class registrations for Component Object Model (COM) objects. This root key is one of the most interesting in the registryto customize, because it enables you to change a lot of the operating system's behavior. Being largest in size,this consumes most of the space.

5.HKEY_CURRENT_CONFIG
It is an association to configuration data for the current hardware profile, the key HKLM\SYSTEM\CurrentcontrolSet\Hardware Profiles\Current. In turn, Current is a link to the key HKLM\SYSTEM\CurrentcontrolSet\Hardware Profiles\nnnn, where nnnn is a incremental numberbeginning with 0000.
One can use various Registry Editing Tools like Registry Pro,Registry Mechanic to change the settings of the registry.
So,with a brief introduction to the registry,we are now in the position to play with it..
Lots of tricks are there in registry which can make the Windows act as u want.But remember to take the back up of the registry as well.A little mistake can even crash ur system.So,beware,while editing he registry.To effect the changes to take place,one must restart the system in each case.

To edit the registry,click on start,click run,type regedit.exe.


1.First I'll start with the tricks which are applied in same reistry key.The key is:
"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"(Remember it as "USMWCPE",Pronounce each alphabet seperatly)
All the values are in 'Hexadecimal' standard. ------------------------------------------------------------------------- a> To Hide All The Icons Of The Desktop,Go To This Key And Edit:
In the right pane,create a new DWORD value and name it: "NoDesktop",of course,without double quotes:Set its value to 1.------------------------------------------------------------------------- b> To Hide All The Drives In My Computer: Create a DWORD value "NoDrives" and set its hexadecimal value to "3FFFFFF". ------------------------------------------------------------------------- c> To Avoid Shutting Down The System:
Create a DWORD value "NoClose"in the right pane and set its value to 1.
-------------------------------------------------------------------------
d> To Disable The Find Menu:
Create a DWORD value "NoFInd" in the right pane and set its value to 1.-------------------------------------------------------------------------
e> To Disable The Recent Documents Menu:
Create a DWORD value "NoRecentDocsMenu" in the right pane and set its value to 1.-------------------------------------------------------------------------
f> To Disable The Right Click:
Create a DWORD value "NoViewContextMenu" in the right pane and set its value to 1.-------------------------------------------------------------------------
2.The second coolest trick is:
When Windows is not shut down correctly, it performs an AutoCheckusing CHKDSK on the next restart.
AutoCheck is executed after a short time delay. AutoCheck can bedisabled or delayed by tweaking a few Registry settings.Run ‘Regedit’ from ‘Start MenuRun...’Go to ‘HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SessionManager’.Create a new DWORD value, ormodify the existing value, called“AutoChkTimeOut” and set it accordingto the value data below.
Value Name: AutoChkTimeOut.Data Type: REG_DWORD (DWORD Value).Value Data: Time in Seconds or 0 to disable(default = 10).Exit your registry, you may need torestart or log out of Windows for thechange to take effect.
-------------------------------------------------------------------------
3.To have information of Windows on the screen,simply go to he following registry key:
"HKEY_CURRENT_USER\ControlPanel\Desktop"
In the right pane,look for the DWORD value"PaintDesktopVersion" and set its value to 1.Restart the system.
-------------------------------------------------------------------------
4.This registry edit will cause your system to reboot itself automatically upon crashing. This can be useful if you have a reason for keeping your system on 24/7:
Open REGEDIT
Navigate to 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl'
Edit the 'AutoReboot' value to '1'
Exit your registry; you may need to restart or log out of Windows for the change to take effect.
-------------------------------------------------------------------------
5.To customize the "Login Prompt",navigate to the key:
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WindowsNT\CurrentVersion\Winlogon.In the right pane,right click to create a new string value and give its name LogonPrompt.Set its value to whatever u want to display.Restart the system.
-------------------------------------------------------------------------
6.By Default,the start menu is aligned to left.To align it to right,simply navigate to the key:
HKEY_CURRENT_USER\ControlPanel\Desktop.On the right pane,try to find the key "MenuDropALignment" and set its value to 1.Restart the system.
-------------------------------------------------------------------------
7.This Registry Trick is specially for the "GAMERS".While playing games,accidently Windows key is pressed which creates a whole mess up.So to disable the Windows key,navigate to the following key:
"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\KeyboardLayout"Look for the value "ScancodeMap" and set its binary value to"00 00 00 00 00 00 00 00 03 00 00 00 00 00 5B E0 00 00 5C E0 00 00 00 00".The Windows key will be disabled.Restart the system.You are done.....Happy Gaming..
-------------------------------------------------------------------------
8.To change the icons of the Desktop Entities:
Navigate the followinf Registry Key:HKEY_CLASSES_ROOT\CLSID\,In the right pane look for the clsid subkey.The list of the subkeys is as under:
My Computer:: {20D04FE0-3AEA-1069-A2D8-08002B30309D}
Recycle Bin:: {645FF040-5081-101B-9F08-00AA002F954E}
Microsoft Outlook::{00020D75-0000-0000-C000-000000000046}
Internet Explorer::{FBF23B42-E3F0-101B-8488-00AA003E56F8}
The Internet::{3DC7A020-0ACD-11CF-A9BB-00AA004AE837}
My Network Places:: {208D2C60-3AEA-1069-A2D7-08002B30309D}
Briefcase:: {85BBD920-42A0-1069-A2E4-08002B30309D}
Dial-Up Networking:: {992CFFA0-F557-101A-88EC-00DD010CCC48}
Run the Registry Editor, go to HKEY_CLASSES_ROOT\CLSID, a key that lets you change the characteristics of system objects, and highlight the CLSID whose name or balloon text you want to change. For example, to change My Computer, highlight the subkey.
HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}. Keepin mind that HKEY_CLASSES_ROOT\CLSID has many CLSIDs listed under it, so it might take you a while to find the proper subkey.Once you find the right subkey, if you want to edit the name of the object, open the Defaultvalue and type in the text that you want to appear underneath the object. If you want to editthe balloon text for the object, open the InfoTip value and type in the text that you want toappear as balloon text. Once you're done, exit the Registry and reboot.
-------------------------------------------------------------------------
9.Change Icons of your Desktop Objects(MyComputer, Recycle bin..):
Go to HKEY_CLASSES_ROOT\CLSID, and look for the CLSID subkey from the table above forthe object whose icon you want to change. Open the subkey and then the "DefaultIcon"subkey under that. To change the icon for My Computer, open the subkeyHKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\DefaultIcon.Change the Default value to the path of the icon that you want to display. Follow the same for changing the icons of ther items as well. Exit the Registry. You might have to reboot forthe new settings to take effect. If you aren't able to change your icons still, then try editing thefollowing: HKEY_CURRENT_USER\Software\Microsoft \Windows\CurrentVersion \Explorer\ CLSID\, and you will be in.
-------------------------------------------------------------------------
So, These are the some of the Registry Tricks...Play Them Cool......