Thursday, 14 March 2013

TIPS FOR BLOGGERS


Tips regarding blogging for shopping:
1. Choose a theme for which you have to write about:
The content writer needs to determine a theme for the shopping blog. While he or she is free to blog about any kind of shopping under the sun, it is good if the author selects a particular class. The categories may vary from buying for apparel to buying for electronics. Zeroing in on a specific subject will help in attracting a niche audience who will be involved in most of your blog applications. Informative content will not suffice. The topic desires to percussion instrument up the interest of the people.
2. Select a catchy name for blog:
Choose a memorable name for your shopping blog. A blog with a catchy name like “The Fashion Diva” is more expected to draw readers than a blog called “I like clothes”. Glimpse to it that your blog name reflects the shopping theme that forms the aim of your blog.
Browse the websites for blogs similar to the blog you desire to compose. Proceed through these blogs and find out their strengths and flaws. The content author desires to find out whether there is a specific shopping related theme that is popular and evokes an allotment of consideration. Such topics can include the cyclic latest trend tendencies. You can furthermore select a topic that has not been much highlighted and thus, has the scope of being farther explored.
3. Do some research
This kind of blog writing may furthermore need you to visit trade displays and other events associated to your area of shopping know-how. For instance, fabric shows will help you get well known with the newest fabric tendencies in newest trend. You can use a combine of informative content and images from these displays to drag in your readers and rivet their vigilance.
4. Use of images
Use illustration and photographs to back your shopping considerations. Using images not only apprehensions the vigilance of your readers but also assists you get your issue over.
5. Knowledge
Study is a must for any content writer and should pattern the basis of all informative content. Locate a few shopping-related causes which you can confer on a regular cornerstone for fresh ideas. Fashion publications, for instance, can be a good source for particular types of shopping blogs.
6. Revise your blog content
Revise your blog at normal gaps. Check and cross ascertain your blogs before posting them. Update your blog on the identical day each week so that readers know in accelerate when to visit your blog.

Wednesday, 13 March 2013

How To Protect Your VPS From Hacker Attacks ?


Virtual Private Server
A VPS server is run on a server that is hosted by another computer. The software that is used allows the computer to perform as if it is on a dedicated server. In actuality, many different virtual private server users are on the same server. By sharing a server, users will have the dedicated server options without the price associated with dedicated servers. Protection software needs to be run on the virtual server so hackers cannot attack your web site.
Control of Your Web Site
People are now aware that they want more control over both the front and back ends of their web site. Web owners want to be able to run their own programs and set up everything the way they want. The only way to have full control over the server is to run a VPS solution. Renting out a server box gives you an unmanaged dedicated server in which everything that happens is up to you. You choose the operating system and the security that goes onto the server.
Linux based VPS Protection
Hackers can attack a virtual server the same way they attack a normal server, so protective software must be run the same as if it were a real machine. Before you make your server public, you will want to set up a couple of things for protection. Do not use root access when making changes on the server. With a Linux system you would use sudo, if you are using Ubuntu, then you must use su. Some people also feel safer just to eliminate the root access altogether. Check the security of your folders. Make sure that the public can only see those folders that are intended for their viewing. The only folder that the public should see is the one that contains your web site.
Passwords
User accounts on the Linux server should have strong and intricate passwords. Never use simple words, family or pets names, street addresses or basic words directly out of the dictionary for a password. Using a strong password with a combination of numbers, upper and lower case letters and even special characters will be harder for hackers to break. Your password should also be a minimum of eight characters.
Firewall Protection
Firewalls should be run on the machine to keep your ports protected. Ports are the easiest way for hackers to get into your information. Make sure that all your software including your operating system is upgraded constantly. When your software and operating system is upgraded, your security will also upgrade, giving you the maximum protection on your server. Virtual Private Servers will give the user the power and flexibility that are in dedicated server but cost a lot less. Maintaining the security of your VPS is the most important function that needs to be handled.
Disabling any unneeded services, ports will be closed making it harder for hackers to gain access. The user will also get better performance out of the server when unnecessary programs are closed.

Sunday, 10 March 2013

FACT

OVERFact : 
                   Studies show that Music with a strong beat can stimulate brain waves which improve concentration, even after you’ve stopped listening.

Monday, 4 March 2013

COPY PEN DRIVE TO SYSTEM IN HIDDEN FORM


PEN DRIVE TO SYSTEM

                   We sometime wish that if someone insert his/her pendrive or Dvd Into your pc then its data automatically copy in to your system in hidden Form. There is no need of software in this. we will make it possible with the help of some Dos commands.
lets get started, Follow the below steps.

1. open cmd
3. type copy con filename.bat
3. now type "xcopy 
i: f:\copied /h /s /c /q /i" remove " "
4. type Exit
4. press f6
5. now it will create a batch file named filename.bat


here
xcopy is a command which is used to copy file and folder
i: is the name of your pen-drive drive name replace with your drive name
f:\copied is the name of folder where you wish to copied data is to be placed replace
with your own folder or path
/h is used to copy hidden files also

now copy this file into desktop now whenever someone insert his/her pendrive into your system then click on this file his data is automatically copied into the folder specified by you.

Sunday, 3 March 2013

Get an Email Alert (with Picture) When Someone Tries to Log into your Computer...?


You have a feeling that someone else used your computer (or at least made an attempt to login) while you were out for a quick coffee break. Maybe that colleague with whom you share the cubicle knows your password or he made a few guesses before finally giving up.
How do you get notified when such an attempt is made to intrude into your computer?
Email alert with a webcam picture of the intruder.
A new website (made in Turkey) called MouseLock.co may have a simple solution here. They will send you an email alert as well as a picture of the intruder as soon as someone tries to use your computer.
Here’s how Mouse Lock works.
You sign-in with your Google Account (they’ll send the alert to your Gmail address) and then select a secret pin on the screen. Next, put your mouse cursor in a designated area on the Mouse Lock website and leave the machine.
Now when someone moves the mouse, they will also have to enter the original pin. If they fail to do that in the first few seconds, Mouse Lock will send you an email and, if the computer has a webcam, it will use that to also snap a picture of the intruder.
Mouse Lock won’t prevent the intrusion but will at least notify you the minute it happens. And best of all, this a web app and thus requires no installation.
Internally, the site uses jQuery (mouseLeaveEvent) to detect mouse movements while the webcam photographs are captured using the getUserMedia() API currently supported in Chrome and Firefox. The alerts, possibly due to a bug, are triggered even when any of the keys are pressed and that makes it a little less useful since there’s no way to lock the computer after setting up the monitor.

You Can Accept Your Failure But not Accept Not doing...!


Use gmail via offline

Use Gma¡l ¡n offline connection :
~Login your gmail & follow this steps below~


1. Click Settings and click the Labs tab.
2. Select Enable next to Offline Gmail.
3. Click Save Changes.
4. After your browser reloads,you’ll see a new “Offline0.1″ link in the upper right hand corner of your account, next to your username. 

#Click this link to start the offline set up process and download Gears if you don’t already have it.
When you hit save, Gmail will synchronize new messages you didn’t have downloadedbefore and remove the ones you’re not planning to read from your hard drive.
Thats it, now you can browse your gmail in offline connection!!

Saturday, 2 March 2013

THis is how an Email works?


Top 5 Parental Time Control Softwares


What Does Parental Time Control Software Do?
Protect your child from online dangers and strangers. Internet is very risky for kids to get attracted to games and chats. It’s highly essential for parents to keep an eye on their kids to keep them at right path. Parental time control software will keep kids safe, on task and out of trouble.Parental time control software performs two functions. It controls the amount of time on computers, the internet or games. And it control what users are allowed to do. Parents, libraries, internet cafés, schools and offices can all benefit from parental control software.
Time Control
You can set time limit of computer usage. Example: You can allow your kid to play games in specific hours and rest of the time he/she can continue with their homework.
Program Control
Parents can restrict Adult and Games website. They can even block chat, games, Facebook and other social networking websites.Specific programs like Yahoo Messanger, gtalk and games can be blocked with the use of Parental control softwares.
Top 5 Parental Time Control Softwares
We look at the variety of features available as well as their helpfulness. The top products not only monitor access and time, but also support restrictions on additional items such as programs, games, chat and downloads and provide reporting.

1. KidsWatch Time Control

KidsWatch™ is much more than the best-rated Parental Controls and Parental Control Software solution. It is loaded and preloaded with many optional benefits and features that improve the security and the quality of the Internet your children see. Installing KidsWatch™ on your computer is customizing the Internet, by child, the way you want your kids to experience and use it.

2. iNet Protector

With iNet Protector you can easily restrict internet access at specified times or on demand. You can allow and block websites and limit which programs and features have access to the internet. For example, you can allow only e-mail and and work or study related websites. You can also simply password protect internet connection or set it to be automatically disabled after a specified amount of time.

3. ENUFF PC         

ENUFF PC was the first computer timer of its kind to be developed and introduced 12 years ago. It was constantly updated and it remained the world’s best for over 8 years.

4. ComputerTime

ComputerTime was designed specifically to reduce the aggravation and concern that parents have having over their children’s computer use.

5. iProtectYou

Internet filtering and parental control software, gives you the ability to control and monitor your child’s use of the Internet, irrespective of where you are: in the neighboring room, at work, or even on vacation, thus enabling you to protect your child from the dangers of the Internet.
Keep your kids protected from Internet treats

UNLOCK MODEM TO USE OTHER SIM CARDS


UNLOCK MODEM TO USE OTHER SIM CARDS



As you must be knowing that we cannot use any simcard in any modem unless you unlock the modem. but in this article we will see how to use Any SIM in any MODEM without unlocking it.


You will need Nokia PC suite for this Trick.
follow the below steps:
1.  Insert the sim card in the modem which you want to and connect it to your PC.
2. IT will show you invalid sim, but dont worry just ignore that message
3. Open Nokia PC suite
4. You will find connect to internet option in Pc suite, click on it.
5. Now you have to configure so select configure, select your data card
     modem and do all operator apn setting which you use in nokia mobile connection.
6. Finally finish the setup and connect to internet  through PC suite.


Now 

your net is connected without unlocking

Friday, 1 March 2013

HOW TO REMOVE VIRUSES IN PENDRIVE WITHOUT ANTI-VIRUS SOFTWARE

Here are some simple steps to tackle a situation where you have pen drive infected with virus and you are afraid to insert it into a clean PC. This works in a situation where your antivirus is not updated and does not have ability to tackle latest virus that may infect. This is a way to avoid infection from virus as we are stopping the virus from executing itself.

1.      First of all, we should modify files and folders setting to show hidden files.
2.      Now uncheck the "Hide extension for known files" option to show the extension of files, so that we can decide which type of we are dealing with.
3.      Uncheck the ‘hide protected operating system files' option. This is because most of the virus scripts will be configured to hide and are created as system files.
4.      Do not open the pen drive by double clicking on the "removable drive" icon, as the script will be written in such a way that the virus is executed by opening the drive by double clicking it. Even the "right click and open" option can execute virus, so alternatively you can open the drive by using the drop down menu from the address bar of your explorer.
5.      After entering into the drive, delete the "autorun.inf" file if present, and delete files you suspect to be viruses that are not added by you, identifying them is easy as they will be having negligible file size (usually in kbs) and have extensions as .com, .bat, .exe.
6.      At last, remove your pen drive and reconnect it.
Most of the viruses are .exe (executable files), .bat (batch files). They are set to execute using shell script which is written in "autorun.inf" present in infected pen drives. We can even see the shell script code by opening this "autorun.inf" file.
 

Thursday, 28 February 2013

01. screenr.com – record movies of your desktop and send them straight to YouTube.
02. bounceapp.com – for capturing full length screenshots of web pages.
03. goo.gl – shorten long URLs and convert URLs into QR codes.
04. untiny.me – find the original URLs that’s hiding behind a short URLs.
05. localti.me – know more than just the local time of a city
06. copypastecharacter.com – copy-paste special characters that aren’t on your keyboard.
07. topsy.com – a better search engine for twitter.
08. fb.me/AppStore – search iOS apps without launching iTunes.
09. iconfinder.com – the best place to find icons of all sizes.
10. office.com – download templates, clipart and images for your Office documents.
11. woorank.com – everything you wanted to know about a website.
12. virustotal.com – scan any suspicious file or email attachment for viruses.
13. wolframalpha.com – gets answers directly without searching  – see more wolfram tips.
14. printwhatyoulike.com – print web pages without the clutter.
15. joliprint.com – reformats news articles and blog content as a newspaper.
16. isnsfw.com – when you wish to share a NSFW page but with a warning.
17. e.ggtimer.com – a simple online timer for your daily needs.
18. coralcdn.org – if a site is down due to heavy traffic, try accessing it through coral CDN.
19. random.org – pick random numbers, flip coins, and more.
20. mywot.com – check the trust level of any website – example.
21. viewer.zoho.com – Preview PDFs and Presentations directly in the browser.
22. tubemogul.com – simultaneously upload videos to YouTube and other video sites.
23. truveo.com – the best place for searching web videos.
24. scr.im – share you email address online without worrying about spam.
25. spypig.com – now get read receipts for your email.
26. sizeasy.com – visualize and compare the size of any product.
27. whatfontis.com – quickly determine the font name from an image.
28. fontsquirrel.com – a good collection of fonts – free for personal and commercial use.
29. regex.info – find data hidden in your photographs – see more EXIF tools.
30. tineye.com – this is like an online version of Google Googles.
31. iwantmyname.com – helps you search domains across all TLDs.
32. tabbloid.com – your favorite blogs delivered as PDFs.
33. join.me – share you screen with anyone over the web.
34. onlineocr.net – recognize text from scanned PDFs and images – see other OCR tools.
35. flightstats.com – Track flight status at airports worldwide.
36. wetransfer.com – for sharing really big files online.
37. pastebin.com – a temporary online clipboard for your text and code snippets.
38. polishmywriting.com – check your writing for spelling or grammatical errors.
39. awesomehighlighter.com – easily highlight the important parts of a web page.
40. typewith.me – work on the same document with multiple people.
41. whichdateworks.com – planning an event? find a date that works for all.
42. everytimezone.com – a less confusing view of the world time zones.
43. warrick.cs.odu.edu – you’ll need this when your bookmarked web pages are deleted.
44. gtmetrix.com – the perfect tool for measuring your site performance online.
45. imo.im – chat with your buddies on Skype, Facebook, Google Talk, etc. from one place.
46. translate.google.com – translate web pages, PDFs and Office documents.
47. youtube.com/leanback – sit back and enjoy YouTube videos in full-screen mode.
48. similarsites.com – discover new sites that are similar to what you like already.
49. wordle.net – quick summarize long pieces of text with tag clouds.
50. bubbl.us – create mind-maps, brainstorm ideas in the browser.
51. kuler.adobe.com – get color ideas, also extract colors from photographs.
52. followupthen.com – setup quick reminders via email itself.
53. lmgtfy.com – when your friends are too lazy to use Google on their own.
54. tempalias.com – generate temporary email aliases, better than disposable email.
55. pdfescape.com – lets you can quickly edit PDFs in the browser itself.
56. faxzero.com – send an online fax for free – see more fax services.
57. feedmyinbox.com – get RSS feeds as an email newsletter.
58. isendr.com – transfer files without uploading to a server.
59. tinychat.com – setup a private chat room in micro-seconds.
60. privnote.com – create text notes that will self-destruct after being read.
61. flightaware.com – live flight tracking service for airports worldwide.
62. boxoh.com – track the status of any shipment on Google Maps – alternative.
63. chipin.com – when you need to raise funds online for an event or a cause.
64. downforeveryoneorjustme.com – is your favourite site really offline?
65. example.com – this website can be used as an example in documentation.
66. whoishostingthis.com – find the web host of any website.
67. google.com/history – found something on Google but can’t remember it now?
68. errorlevelanalysis.com – find whether a photo is real or a photoshopped one.
69. google.com/dictionary – get word meanings, pronunciations and usage examples.
70. urbandictionary.com – find definitions of slangs and informal words.
71. seatguru.com – consult this site before choosing a seat for your next flight.
72. sxc.hu – download stock images absolutely free.
73. imo.im – chat with your buddies on Skype, Facebook, Google Talk, etc. from one place.
74. wobzip.org – unzip your compressed files online.
75. vocaroo.com – record your voice with a click.   The 101 Most Useful Websites  4
76. scribblemaps.com – create custom Google Maps easily.
77. buzzfeed.com – never miss another Internet meme or viral video.
78. alertful.com – quickly setup email reminders for important events.
79. encrypted.google.com – prevent your ISP and boss from reading your search queries.
80. formspring.me – you can ask or answer personal questions here.
81. snopes.com – find if that email offer you received is real or just another scam.
82. typingweb.com – master touch-typing with these practice sessions.
83. mailvu.com – send video emails to anyone using your web cam.
84. ge.tt – quickly send a file to someone, they can even preview it before downloading.
85. timerime.com – create timelines with audio, video and images.
86. stupeflix.com – make a movie out of your images, audio and video clips.
87. aviary.com/myna – an online audio editor that lets you record and remix audio clip.
88. noteflight.com – print music sheets, write your own music online (review).
89. disposablewebpage.com – create a temporary web page that self-destruct.
90. namemytune.com – when you need to find the name of a song.
91. homestyler.com – design from scratch or re-model your home in 3d.
92. snapask.com – use email on your phone to find sports scores, read Wikipedia, etc.
93. teuxdeux.com – a beautiful to-do app that resembles a paper dairy.
94. livestream.com – broadcast events live over the web, including your desktop screen.
95. bing.com/images – automatically find perfectly-sized wallpapers for mobiles.
96. historio.us – preserve complete web pages with all the formatting.
97. dabbleboard.com – your virtual whiteboard.
98. whisperbot.com – send an email without using your own account.
99. sumopaint.com – an excellent layer-based online image editor.

Wednesday, 27 February 2013

TO HACK ADMIN PASSWORD THROUGH GUEST ACCOUNT


 TO HACK ADMIN PASSWORD THROUGH GUEST ACCOUNT

 It will provide you to awesome and easy trick through which you can hack admin account through guest account.

If you been using someones Pc in guest account and want to have Admin privilage then don’t worry.There is a trick for you to Gain Admin Privilage .

Method 1.
1)Go to C:/windows/system32.

2) Copy cmd.exe and paste it on
 desktop.

3) Rename cmd.exe to sethc.exe.

4) Copy the new sethc.exe to system 32, when windows asks for overwriting the file, then click yes.

5) Now Log out from your guest account and at the user select window, press shift key 5 times.

6) Instead of Sticky Key confirmation dialog,
command prompt with full administrator privileges will open.

7) Now type “NET USER ADMINISTRATOR "  “zzz"  where “zzz" can be any password you like and press enter.

8) You will see   “The Command completed successfully" and then exit the
 command prompt and login into administrator with your new password.


9) Now you have hacked admin through guest account.






Tuesday, 26 February 2013

SUCCESS OF WINDOWS 8


Windows 8 introduces significant changes to the operating system's platform, primarily focused towards improving its user experience on mobile devices such as tablets to better compete with other mobile operating systems like Android and Apple's iOS.

SUCCESS OF WINDOWS 8
The Microsoft New OS version is windows 8 Proved its success.60 million Windows 8 licenses have been sold through January 2013. This includes upgrades and sales to OEMs for new PCs.

.
SUPPORT STATUS

Do you Know about the support status of Windows 8
It starts from October 2012.The mainstream Support is until January 9, 2018 and extends until January 10, 2023.

Windows 8 takes advantage of new or emerging technologies like USB 3.0, 4Kn Advanced Format, near field communications, cloud computing, and the low-power ARM architecture.

It includes new security features such as built-in antivirus capabilities, a new installation process optimized for digital distribution, and support for secure boot (a UEFI feature which allows operating systems to be digitally signed to prevent malware from altering the boot process).

The other features of windows 8 is the Metro Style START MENU along with Hybrid Boot and windows 8 Store app

..Hybrid boot......
New features and functionality in Windows 8 include a faster startup through UEFI integration and the new "Hybrid Boot" mode (which hibernates the Windows kernel on shutdown to speed up the subsequent boot),a new lock screen with a clock and notifications, and the ability for enterprise users to create live USB versions of Windows (known as Windows To Go).

Windows Store apps were originally known as "Metro-style apps" during the development of Windows 8, referring to the Metro design language. The term was reportedly phased out in August 2012; a Microsoft spokesperson denied rumors that the change was related to a potential trademark issue, and stated that "Metro" was only a codename that would be phased out prior to Windows 8's release
 

Monday, 25 February 2013

Send sms to mobile using Gmail


How to enable Send SMS/Text Messages feature in Gmail

It is very simple to add the feature. You can do it from the Google Labs. Followings are the steps involving to enable the SMS or text message feature via Google Labs in your Gmail account.
1. Sign-in to your Gmail account.
2. Click on “Settings” from the right hand top corner of the windows.
3. Click on “Labs” tab.
4. Scroll down for the lab feature “gmark” and click on the enable button.
5. Save the changes from the end of the page.
You are done! Now you can send SMS from the chat gadget of Gmail.
But if you want things to be done more comfortably then you can enable another feature from the Lab list to add a gadget to your account. It allows you to send SMS to any body from a gadget at your Gmail account.
The name of that lab feature is “Send SMS”.
This works only if you have enabled the “gmark” lab feature.
So enable those awesome Google lab features and send SMS or text messages to your friends.

Top Web Servers


Apache web server - the HTTP web server

The free Apache web serverFree and the most popular web server in the world developed by the Apache Software Foundation. Apache web server is an open source software and can be installed and made to work on almost all operating systems including Linux, Unix, Windows, FreeBSD, Mac OS X and more. About 60% of the web server machines run the Apache web server.
Apache Tomcat
Apache Tomcat logoThe Apache Tomcat has been developed to support servlets and JSP scripts. Though it can serve as a standalone server, Tomcat is generally used along with the popular Apache HTTP web server or any other web server. Apache Tomcat is free and open source and can run on different operating systems like Linux, Unix, Windows, Mac OS X, Free BSD.

Microsoft's Internet Information Services (IIS) Windows Server

IIS Windows Web Server from MicrosoftIIS Windows Web Server has been developed by the software giant, Microsoft. It offers higher levels of performance and security than its predecessors. It also comes with a good support from the company and is the second most popular server on the web.

Nginx web server

Nginx web serverFree open source popular web server including IMAP/POP3 proxy server. Hosting about 7.5% of all domains worldwide, Nginx is known for its high performance, stability, simple configuration and low resource usage. This web server doesn't use threads to handle requests rather a much more scalable event-driven architecture which uses small and predictable amounts of memory under load.

lighttpd

lighttpd web server logolighttpd, pronounced "lighty" (don't ask me why), is a free web server distributed with the FreeBSD operating system. This open source web server is fast, secure and consumes much less CPU power. Lighttpd can also run on Windows, Mac OS X, Linux and Solaris operating systems.

Jigsaw

W3C web server - JigsawJigsaw (W3C's Server) comes from the World Wide Web Consortium. It is open source and free and can run on various platforms like Linux, Unix, Windows, Mac OS X Free BSD etc. Jigsaw has been written in Java and can run CGI scripts and PHP programs.

Klone

Klone web serverKlone, from KoanLogic Srl, includes a web server and an SDK for creating static and dynamic web sites. It is a web application development framework especially for embedded systems and appliances. No additional components are required when using Klone; thus, one can do away with an HTTP/S server or the active pages engine (PHP, Perl, ASP).

Abyss web server

Abyss web server from ApreliumAbyss compact web server runs on all popular platforms - Windows, Mac OS X, Linux and FreeBSD. The personal edition is (X1) 100% free while the professional Abyss Web Server X2 has a small price tag of $60. Supports HTTP/1.1, secure connections, CGI/FastCGI, custom error pages, password protection and much more. The server also has an automatic antihacking system and a multiligual remote web management interface.

Oracle Web Tier

Oracle Web TierIncludes two web server options with reverse proxy and caching solutions that lead to quick serving of web pages and easy handling of even the most demanding http traffic. The iPlanet Web Server, for example, is a high-performance server with enhanced security and mutithreaded architechture that scales well on modern 64-bit multiprocessors.

X5 (Xitami) web server

X5 logo - Xitami from iMatix CorporationThe cross-platform X5 from iMatrix Corporation is the latest generation web server using the company's own multithreading technology (Base2) that makes it scalable to multi cores. As per the iMatrix, X5 can handle thousands of connections without difficulty and thus is useful for long polling in which connections from clients remain open for extended durations.

Zeus web server

Zeus web serverThe Zeus web server runs on Linux and Free BSD operating systems among others. It has been developed by Zeus technology Ltd. And is known for its speed, reliability, security and flexibility. The web server is used on some of the busiest web sites of the world including Ebay. Zeus web server is not free and costs more than a thousand pounds.

Sunday, 24 February 2013

Top 10 Engineers

10. Alan Turing
Alan Turing developed the binary architecture now used in all computers, as well as much of the theory behind computers.

9. Nicolaus Otto
Nicolaus Otto was a German ENGINEER credited with developing the four-stroke or Otto-cycle engine which sparked the development of the motor care.

8. Nikola Tesla
Every electrical engineer should have a picture of Nikola tattooed somewhere on their bodies. Maybe not a tattoo but at least have a picture of him hanging in their office.
Tesla’s inventions make him arguably the greatest electrical engineer of all time.
His inventions include fluorescent lighting, the Tesla coil, the induction motor, and 3-phase electricity. He developed the AC-current generation system comprised of a motor and a transformer.

7. Archimedes
It was Archimedes who came up with the simple yet clever idea of determining an object’s volume by measuring the amount of water displaced by the object.
.
.
6. James Watt
James Watt was an enthusiastic ENGINEER whose improvement of the steam engine sparked the Industrial Revolution
.
.
5. Hero of Alexandria
This man could have started the Industrial Revolution in 50 AD with the invention of the Aeolipile, a form of steam or jet engine where jets of steam spin a ball. However, he failed to realize what the device could do, and thought of it as nothing but a toy.

4. Wilbur and Orville Wright
The Wright brothers were the first to look at propeller design and aerodynamics, profoundly changing the world.
.
.
3. Henry Ford
Ford produced cars at a record-breakingrate forever changing the automobile industry.
.
.
2. Thomas Edison
Edison is the most prolific inventor in history, holding a record 1,097 patents.
.
.
1. Leonardo da Vinci
Leonardo foresaw everything from the helicopter to the tank to the submarine. There have been few individuals in the history of engineering who have designed so many revolutionary devices that actually worked

Monday, 18 February 2013

funny notepad Tricks


BEST 5 NOTEPAD TRICKS (PRANKS)

1.      Matrix Coding
It creates matrix coding in cmd prompt

Open Notepad > Paste the Following code > Save it as Matrix.bat

@echo off
color 02
:tricks
echo %random%%random%%random%%random%%random%%random%%random%%random%
goto tricks


2. Keyboard types Automatically
                        It types automatically until u logout

Open Notepad > Paste the Following code > Replace "This is a Virus" with Any Text > Save it as Trick.VBS

Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "This is a Virus. You have been infected."
loop



2.      Continuously Eject CD/DVD Tray
It eject your cd/dvd tray 5000 times

Open Notepad > Paste the Following code > Save it as Eject.VBS


Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop



4. Open Notepad Infinitely
It opens notepad infinitely

Open Notepad > Paste the Following Code > Save it as NP.Bat

@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top


5. Make your Computer Talks: BEST!
            It speak wat you write

Open Notepad > Paste the following code > Save it as Talk.VBS
Launch it > Put the text you want to talk > Click OK


Dim Message, Speak
Message=InputBox("Enter Text to Talk o","Speak")
Set Speak=CreateObject("sapi.spvoice")
Speak.Speak Message