Friday, October 28, 2011

Origin of famous Company Names

There are many companies / brands / products whose names were derived from strange circumstances.
Mercedes
This was actually the financier’s daughter’s name.
Adobe
This came from name of the river Adobe Creek that ran behind the house of founder John Warnock.
Apple Computers
It was the favorite fruit of founder Steve Jobs. He was three months late in filing a name for the business, and he threatened to call his company Apple Computers if the other colleagues didn’t suggest a better name by 5 O’clock.
CISCOIt is not an acronym as popularly believed. It is short for San Francisco.
Compaq
This name was formed by using COMp, for computer, and PAQ to denote a small integral object.
Corel
The name was derived from the founder’s name Dr.Michael Cowpland. It stands for COwpland REsearch Laboratory.
Google
The name started as a joke boasting about the amount of information the search-engine would be able to search. It was originally named ‘Googol’, a word for the number represented by 1 followed by 100 zeros.
After founders- Stanford graduate students Sergey Brin and Larry Page presented their project to an angel investor, they received a cheque made out to ‘Google’
Hotmail
Founder Jack Smith got the idea of accessing e-mail via the web from a computer anywhere in the world. When Sabeer Bhatia came up with the business plan for the mail service, he tried all kinds of names ending in
‘mail’ and finally settled for hotmail as it included the letters “html” – the programming language used to write web pages. It was initially referred to as HoTMaiL with selective uppercasing.
Hewlett Packard
Bill Hewlett and Dave Packard tossed a coin to decide whether the company they founded would be called Hewlett-Packard or Packard-Hewlett.
Intel
Bob Noyce and Gordon Moore wanted to name their new company ‘Moore Noyce’but that was already trademarked by a hotel chain so they had to settle for an acronym of INTegrated ELectronics.
Lotus (Notes)Mitch Kapor got the name for his company from ‘The Lotus Position’ or ‘Padmasana’. Kapoor used to be a teacher of Transcendental editation of Maharishi Mahesh Yogi.
MicrosoftCoined by Bill Gates to represent the company that was devoted to MICROcomputer SOFTware. Originally christened Micro-Soft, the ‘-’ was removed later on.
Motorola
Founder Paul Galvin came up with this name when his company started manufacturing radios for cars. The popular radio company at the time was called Victrola.
ORACLE
Larry Ellison and Bob Oats were working on a consulting project for the CIA (Central Intelligence Agency). The code name for the project was called Oracle (the CIA saw this as the system to give answers to all questions or something such). The project was designed to help use the newly written SQL code by IBM. The project eventually was terminated but Larry and Bob decided to finish what they started and bring it to the world. They kept the name Oracle and created the RDBMS engine. Later they kept the same name for the company.
Sony
It originated from the Latin word ’sonus’ meaning sound, and ’sonny’ a slang used by Americans to refer to a bright youngster.
SUNFounded by 4 Stanford Universitybuddies, SUN is the acronym for Stanford University Network. Andreas Bechtolsheim built a icrocomputer; Vinod Khosla recruited him and Scott McNealy to manufacture computers based on it, and Bill Joy to develop a UNIX-based OS for the computer.
Yahoo!
The word was invented by Jonathan Swift and used in his book ‘Gulliver’s Travels’. It represents a person who is repulsive in appearance and action and is barely human. Yahoo! Founders Jerry Yang and David Filo selected the name because they considered themselves yahoos

Monday, October 24, 2011

Adobe Creative Suite CS5 Master Collection

Adobe Creative Suite CS5 Master Collection:
Adobe Creative Suite is a set of professional creative tools for delivery of design across Media. Make a work for Virtually any screen, Mobile, Tablet to HD Display.

What's Inside:
  • Adobe Photoshop CS5 Extended
  • Adobe Illustrator CS5
  • Adobe InDesign CS5
  • Adobe Acrobat CS5
  • Adobe Flash Catalyst CS5
  • Adobe Flash Professional CS5
  • Adobe Flash Builder 4.5 Premium Edition
  • Adobe Dreamweaver CS5
  • Adobe Fireworks CS5
  • Adobe Contribute CS5
  • Adobe Premier CS5
  • Adobe After Effects CS5
  • Adobe Audition CS5
  • Adobe Onlocation CS5
  • Adobe Encore CS5
  • Adobe Bridge CS5
  • Adobe Device Central CS5
  • Adobe Media Encoder CS5
  • Integrates with - CS Live Online services 1.2

Installation Instructions:
1./ Install Adobe Master Collection
2./ Use XFORCE keygen to generate your serial
3./ When the installation is finished
Execute "disable_activation.cmd" from Win folder(double click on it)
(in vista or Win7, run it as admin if you have uac enabled)
4./Enjoy it
Hope this will help you. 


Please download both the files give below:






Sunday, October 23, 2011

Resident Evil 5 (PC)



Resident Evil 5 (2009/PCDVD/MULTI9/ENG/RUS/Lossless/RePack)
Year: 2009 | Developer: Capcom Entertainment | Publisher: Capcom Entertainment | PC |
Language: English Russian Etc | Genre: Action (Shooter) / 3D / 3rd Person | File Size : 3.38 GB |

A professional soldier Chris Redfield the well-known players from the previous parts Resident Evil does not leave hope to wipe out all traces of activity which has for decades engaged in developing biological weapons. So far all studies on the establishment of the army invulnerable monsters fizzle but the mad scientists are optimistic and continue to conduct cruel experiments on living people. In search of truth the main character goes to a small African village and discovers hundreds of people affected by another experimental virus. Poor things have changed not only externally but also internally: pursued by severe hunger they attack anything that moves. The virus has turned patients into ideal murderers having made their bodies much stronger and sturdier. And very soon Chris and his companion Sheva Alomar will have to face serious opponents little resembling mindless ghouls from previous games Resident Evil ...

Features
- Sense and Sensibility. It is extremely dangerous and aggressive enemies significantly increased their intelligence and reaction speed in addition they learned to find common ground with like-minded and able to join in the group.
- The power and accuracy. An impressive arsenal of military heroes such as knives pistols machine guns sniper rifles and more.
- Dream and reality. Modern graphic effects unprecedented level of detail some know-how in the processing of lighting and shadows.

Features RePack
- Nothing is converted / not cut
- Installation time ~ 25 minutes

Install and run
- run Setup.exe
- Installed by following the instructions of the installer
- Play!

System requirements:
- Operating System: Windows XP SP3 / Windows Vista / Windows 7
- Processor: Intel 3.0 GHz / AMD 2.5 GHz
- Memory: 1 GB (Windows XP) / 2GB (Windows Vista / Windows 7)
- Video: 256 Mb memory compatible c Direct 9.0
- Sound Card: DirectX 9.0c compatible
- Free space on hard disk: 8 GB

Screenshots:




Download Links:

Fileserve:
http://www.fileserve.com/file/9Yf3ZpS/R-E-V-2009-PC-MULTI9-ENG-RUS.part1.rar
http://www.fileserve.com/file/5H2bpkH/R-E-V-2009-PC-MULTI9-ENG-RUS.part2.rar
http://www.fileserve.com/file/e5fryjF/R-E-V-2009-PC-MULTI9-ENG-RUS.part3.rar
http://www.fileserve.com/file/u8acSGp/R-E-V-2009-PC-MULTI9-ENG-RUS.part4.rar
http://www.fileserve.com/file/sCg3qfz/R-E-V-2009-PC-MULTI9-ENG-RUS.part5.rar
http://www.fileserve.com/file/7WHM65Y/R-E-V-2009-PC-MULTI9-ENG-RUS.part6.rar
http://www.fileserve.com/file/3GHaUqR/R-E-V-2009-PC-MULTI9-ENG-RUS.part7.rar
http://www.fileserve.com/file/xcS9HVZ/R-E-V-2009-PC-MULTI9-ENG-RUS.part8.rar

File Jungle:
http://www.filejungle.com/f/fsHvth/R-E-V-2009-PC-MULTI9-ENG-RUS.part1.rar
http://www.filejungle.com/f/KSxqFb/R-E-V-2009-PC-MULTI9-ENG-RUS.part2.rar
http://www.filejungle.com/f/JJd2pm/R-E-V-2009-PC-MULTI9-ENG-RUS.part3.rar
http://www.filejungle.com/f/dgXFdb/R-E-V-2009-PC-MULTI9-ENG-RUS.part4.rar
http://www.filejungle.com/f/rVGjWV/R-E-V-2009-PC-MULTI9-ENG-RUS.part5.rar
http://www.filejungle.com/f/UQqCzv/R-E-V-2009-PC-MULTI9-ENG-RUS.part6.rar
http://www.filejungle.com/f/tpZG72/R-E-V-2009-PC-MULTI9-ENG-RUS.part7.rar
http://www.filejungle.com/f/876Psj/R-E-V-2009-PC-MULTI9-ENG-RUS.part8.rar

WUpload:
http://www.wupload.com/file/610963331/R-E-V-2009-PC-MULTI9-ENG-RUS.part1.rar
http://www.wupload.com/file/610966011/R-E-V-2009-PC-MULTI9-ENG-RUS.part2.rar
http://www.wupload.com/file/610969336/R-E-V-2009-PC-MULTI9-ENG-RUS.part3.rar
http://www.wupload.com/file/610977311/R-E-V-2009-PC-MULTI9-ENG-RUS.part4.rar
http://www.wupload.com/file/610977931/R-E-V-2009-PC-MULTI9-ENG-RUS.part5.rar
http://www.wupload.com/file/610982761/R-E-V-2009-PC-MULTI9-ENG-RUS.part6.rar
http://www.wupload.com/file/610987206/R-E-V-2009-PC-MULTI9-ENG-RUS.part7.rar
http://www.wupload.com/file/610988846/R-E-V-2009-PC-MULTI9-ENG-RUS.part8.rar

Filesonic:
http://www.filesonic.com/file/2680422834/R-E-V-2009-PC-MULTI9-ENG-RUS.part1.rar
http://www.filesonic.com/file/2680423074/R-E-V-2009-PC-MULTI9-ENG-RUS.part2.rar
http://www.filesonic.com/file/2680427144/R-E-V-2009-PC-MULTI9-ENG-RUS.part3.rar
http://www.filesonic.com/file/2680432304/R-E-V-2009-PC-MULTI9-ENG-RUS.part4.rar
http://www.filesonic.com/file/2680434984/R-E-V-2009-PC-MULTI9-ENG-RUS.part5.rar
http://www.filesonic.com/file/2680439984/R-E-V-2009-PC-MULTI9-ENG-RUS.part6.rar
http://www.filesonic.com/file/2680440414/R-E-V-2009-PC-MULTI9-ENG-RUS.part7.rar
http://www.filesonic.com/file/2680441994/R-E-V-2009-PC-MULTI9-ENG-RUS.part8.rar
 

InternetDownloadManager (IDM) v6.07(Multi-lingual) Final + Crack

InternetDownloadManager (IDM) is a tool to increase download speeds, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.

IDM has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download accelerators and managers that segment files before downloading starts, Internet Download Manager segments downloaded files dynamically during download process. Internet Download Manager reuses available connections without additional connect and login stages to achieve better acceleration performance.

Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, directories with authorization, MP3 audio and MPEG video content processing, and a large number of directory listing formats. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.

Some features of IDM:

* IDM supports all popular browsers and applications. It can also be integrated into any 3rd party Internet applications.
* When you click on a download link in a browser, IDM starts the download and accelerate it. It supports HTTP, FTP and HTTPS protocols.
* IDM can accelerate downloads by up to 5 times due to its dynamic file segmentation technology.
* IDM can also resume unfinished download from the place where they were left off.
* Antivirus checking makes your downloads free from all kinds of viruses and trojans.
* Advanced Browser Integration. can be used to catch any download from any application. No other download managers have this interesting feature.
* IDM can connect to the Internet at a set time, download the files you want, disconnect, or shut down your computer when all the downloads are done.
* IDM supports many types of proxy servers. For instance, IDM works with Microsoft ISA, and FTP proxy servers.
* IDM supports main authentication protocols like Basic, Negotiate, NTLM, and Keberos. Therefore, It can access many Internet and proxy servers using login name and password.

What's new in version 6.07 Build 12:
* Added support for Firefox 8
* Improved video discovery on youtube
* Fixed bugs

Multilingual: English, Spanish, French, Italian, Deustch, Japanese, Portugues, etc
Compatible with: Windows 95/98/Me/2000/NT/XP/2003/Vista/Server 2008/7 (32/64-bit)



Avira Antivirus Premium 2012 + Crack

Avira AntiVir Premium protects you against all threats i.e., viruses, worms, trojans, rootkits, phishings, adware, spyware, bots. It has best detection rates and high-class security with tons of updates every day.
It includes basic antivirus protection, email protection (POP3), AntiPhishing, AntiSpyware, AntiAdware and more. With real-time scanning and scheduling of full system scanning and several updates it offers premium and high protection. It includes a POP3 based Mail Scanner that scans all your emails before they are stored on your Work Station. With a user-friendly control center, quarantine management, fast performance and high detection rates the Avira AntiVir Premium provides essential protection for your PC and Laptop.

AntiVir Personal offers high and effective protection against computer viruses for the individual and private use on a single PC-workstation. It detects and removes viruses and includes an Internet-Update Wizard for easy updating.



Friday, October 21, 2011

[Tech] Steve Jobs vowed to 'Destroy' Android

The Apple Co-founder (Steve Jobs) who died earlier this month of Pancreatic Cancer, was enraged by Google's Android, the best selling Operating System.

"I will spend my last breath and I will spend every penny of Apple's $40 billion in the Bank, to right this wrong." He told Walter Isaacson, the author of an official biography to be published in United States.

"I'm going to Destroy Android as it is a Stolen Product. I am willing to go Thermonuclear war on this."

Apple has been engaged in a battle with Google's manufacturing partners like Samsung for over a year. His official Biography is the first time Mr. Jobs personal anger over the dispute has been revealed.

Apple has alleged that Samsung Smartphones and Tablets are copies of iPhone and iPad.

Apple has also targeted HTC and Motorola which Google bought. That was widely seen as an attempt to destroy Android by acquiring Motorola's patent portfolio.

The iPhone was unveiled in January and promoted the Smartphone Revolution.

At that time, Eric Schmidt (the Chief Executive of Google) resigned as the two firms became increasingly fierce rivals.

In Mar 2010, Mr Jobs and Mr. Schmidt were pictured at a coffee meeting in Palo Alto. Referring against the HTC Handset, Mr. Jobs told Mr. Schmidt : "I don't want your Money, If you offer me $5 billion, I won't take it."
     "I have got huge money. I want you to stop using Apple's Ideas on Android."

Monday, October 17, 2011

How to Hack a Computer - Cain and Cable

Cain and Abel (sometimes called simply "Cain") is a Windows password recovery tool. It can recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks. Cryptanalysis attacks are done via rainbow tables which can be generated with the winrtgen.exe program provided with Cain and Abel. Cain and Abel is maintained by Massimiliano Montoro.Kumar has already posted about how to use Cain and Abel to hack Networks.

Cain & Abel is a useful tool for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. 

How to hack a Computer with Cain and Able

  • This hack will only work for Computers connected on LAN.
  • First of all download Cain and Abel Software.
  • Now install the software and open it . Make sure that you dont have any active antivirus on your pc.
  • First Click the Sniffer Tab.
  • Now Click on the sniffer button in the top toolbar. On clicking ,the sniffer will start.
  • Now click on + button to add the range of ip address you want to hack on LAN. Like in my hostel my ip is something like 15.15.15.04 so I have given the range from 15.15.15.1 to 15.15.15.254 .
  • Tick the option which says " All Tests ".
  • Click OK and you will see the software will start all the test.
  • After completion of these tests you will see the MAC Addresses ,IP addresses and OUI fingerprints of all computers running in your LAN .
  • Now click on APR tab below.In APR there are two windows .
  • Click on the above window and the + button will appear above .Now Click that button and a new window will open.
  • Left side window will show all the ip addresses and right window will be empty.
  • Click on any IP address in the Left Window and all other IPs will automatically appear in right window.Suppose I click on 15.15.15.1 .
  • Press Cntrl and select all the ips in the right window and Click OK.
NOTE: What you are doing ? Actually you are going to poison all the other ips using 15.15.15.1 . In this way you will be totally safe . If someones tries to know who is poisoning then he will get the ip of 15.15.15.1 and you are safe here :)
  • All these ips will be shown in above window.
  • Now Click on APR Button in the top toolbar and as you click on that button poisoning will start.It will show in the below window.
  • Now click on the Password tab below.
  • In the left  list you will see HTML .Click on it.
  • Hurrah you got the passwords of all the PCs and also the sites they have recently visited .
NOTE: APR poisoning is very dangerous , and during this hack your LAN is fully loaded and it affects the speed a lot .

Status with Virus Scanners

  • Some virus scanners, notably Avast! detect Cain and Abel as 'malware' "Win32:Cain-B [Tool]". It's classified in Avast! as "Other potentially dangerous program". 
  • The author, and owner of oxid.it states that his programs are not Malware. Even if Cain's install directory, as well as the word "Cain", are added to Avast's exclude list, the real-time scanner will stop Cain from functioning. 
  • The latest version of Avast no longer blocks

Attacks Available in Cain and Abel

  • The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs Man-in-the-Middle attacks. 
  • The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. 
  • The new version also ships routing protocols authentication monitors and routes extractors.
  • Dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.

Features

  • WEP cracking
  • Speeding up packet capture speed by wireless packet injection
  • Ability to record VoIP conversations
  • Decoding scrambled passwords
  • Calculating hashes
  • Traceroute
  • Revealing password boxes
  • Uncovering cached passwords
  • Dumping protected storage passwords
  • ARP spoofing
  • IP to MAC Address resolver
  • Network Password Sniffer

Kaspersky Internet Security 2012 Final + Keys




Kaspersky Internet Security is a comprehensive computer defense system from all types of electronic threats, such as malware, hacker exploits, spam, rootkits, spyware, phishing messages, persistent popup ads, etc.

In addition to the Anti-Viruses, the application includes a new generation personal Firewall, a Proactive Defense component offering protection from unknown threats, a Privacy Control component providing protection from Internet fraud, and an Anti-Spam component which filters out unsolicited emails.

Kaspersky Internet Security Version includes a number of improvements which expand its functionality and the level of protection significantly. Thus, the new Parental Control module monitors users' browsing activity and blocks access to web resources containing violence, pornography, promotion of drugs or limits time online. The Confidential Data Protection module of the Privacy Control component prevents theft of important information, such as, email addresses, passwords, banking information, and credit card numbers.

Even with the added functionality and comprehensive protection, controlling the Kaspersky Internet Security application has become even simpler and more convenient: a beginner would be able to select an application installation type and a protection mode to suit his or her needs from the provided list of options.

Kaspersky Internet Security was initially developed for the new Microsoft Windows Vista operating system. It is fully compatible both with the 32 and the 64-bit versions of the operating system. The product interface follows the style of Microsoft Windows Vista and integrates naturally with its graphic environment.

Features of Kaspersky Internet Security :

• The Best Anti-Virus Protection
· Ranked #1 for anti-virus detection
· The industry's fastest response time to new Internet threats
· Standard automated hourly anti-virus updates (Tiny at ~50 Kb each!)
· The most monthly updates available
· Real-time e-mail, file and web scanning for safe surfing
• Robust Spyware Protection
· #1 in spyware & adware detection
· Prevents rootkits and keyloggers from stealing personal data
· Automatically removes hidden spyware
· Detects unauthorized activity & probes
· Blocks unwanted pop-ups & banners
• Anti-Hacker Protection
· Fully integrated personal firewall
· New generation Intrusion Detection/Prevention System (IDS/IPS)
· Privacy controls protect passwords and confidential data
· Parental controls limit online time and access to forbidden sites (with tracking)
· Stealth mode to remain invisible online
• Anti-Spam Protection
· Sophisticated self-learning system
· Robust phishing protection against identity theft
· E-mail header previewing before down-loading messages
· Blacklist and whitelists for addresses and phrases
· Analysis of graphics in spam
• Impressive System Performance
· The least processor, memory and bandwidth resources required
· Rapid iSwiftT and iCheckerT virus scanning for accelerated performance
· Automatic balancing of scan speeds with increased user activity
· Ideal for instant messaging and WiFi
• Minimize Any Downtime
· Easy-to-create rescue disk instantly restores your system if damaged
· Rapidly rollback any malicious changes including restoring encrypted data

What's New in Kaspersky Anti-Virus 2010 9.0 :

• Improvements :
· Implemented support for Microsoft Windows 7.
· Improved methods of dealing with complex threats.
· Improved vulnerability scan, which facilitates security threats' search and elimination in the applications installed on your computer and in operating system settings.
· Improved module of Kaspersky Lab news delivery – News agent.
· Compatibility problems between safe environment and some applications.
• Bug Fixed :
· Problem with system instability after long period of program operation has been fixed.
· Error causing BSOD while updating the emulator driver has been fixed.
· Pop-up message in the URL checking module has been fixed (for the Spanish version).
· Problem with pausing the scan task while third party programs are running in full-screen mode has been fixed.
· Problem with the update task freezing at system startup has been fixed.
· Vulnerability that allowed disabling of computer protection using an external script has been eliminated.
· Driver crash in rare cases while processing a write operation has been fixed.
· Crash while processing data incompliant with the protocol of Mail.Ru Agent has been fixed.

Download

[TUT] How to hide (Delete) Recycle Bin icon from the Desktop

Do you want to Delete the Recycle Bin icon from Desktop and want to amaze your friends??

Follow This:

1. Goto Start > Run.
2. Type gpedit.msc and press Enter
3. Find Administrative Templates and click on its sign (+).
4. Click on Desktop and search and open Remove Recycle Bin from the Desktop.
5. A new window appears, you must select Enable and click on the OK button.

Your Recycle Bin has been Deleted (hide) from your Desktop.

If you want to restore it back, follow the same procedure and select Not Configured instead of selecting Enable.





[TUT] Attractive Explorer Background

You Don't get bored by looking the Boring Explorer Background??

Now, I am going to show you how to transform your Boring Background into an amazing Cool Background.

To do this, just follow this Steps:
1. Copy the following code in your text editor (I prefer Notepad)
2. Save it as "desktop.ini" (without quotes) in the folder whose Background you want to change.
3. [{BE098140-A513-11D0-A3A4-00C04FD706EC}]
iconarea_image="complete picture location"
iconarea_text=0x00000000 <------- File text color can be set to any value

just now its black.
0x00ffffff for white.

4. Run the following command in the command prompt
        attrib +s "path of the folder"
e.g. attrib +s "E:\old download" will change the background of the folder "old download"

It would be good to keep the file desktop.ini hidden.
So right click on it > go to properties and change its atribute to hidden. Thats it.

Enjoy..!!!

Online Useful Softwares

1)Online Audio Editor
---------------------
go to http://www.aviary.com/online/audio-editor
record or import your audio file.
edit it with echo & different sound effects.
save it :)

2)Online Photo Editor
----------------------
go to http://www.pixlr.com/editor/
open your picture.
edit it with nice colours & styles what ever u want to do.
save it :)

3)Online Video Editor
---------------------
go to http://jaycut.com/video-editor-demo
open your video or record from webcam
edit text in it or mix different videos
save it :) { when u save they gonna send u a download link for

your video to download}

4) Online Office (word, spreadsheet etc..)
------------------------------------------
go to http://member.thinkfree.com/member/goAboutService.action?

page=online

sign up.
work !

5) Online Paint & Graphic Editor
--------------------------------
go to http://www.sumopaint.com/app/
make a drawing with tools
save it :)

Note:- some sites might need sign up or the plugin installations!

[MISC] Important Toll-Free Numbers

Indian Railway in collaboration with Google is now providing a 10 digit mobile number. Just SMS your PNR number on this mobile number and instantaneously you will get your ticket's current status along with all other journey related details.
The number is
97733-00000. NO need to prefix 0 or +91.
Best of all, you don't pay a premium charge for any of this, just the price of a standard SMS.
PLEASE DON'T FORGET TO STORE THE NUMBER IN YOUR MOBILE PHONE
.


Other Toll Free Numbers in India ,
Airlines

Indian Airlines - (1800 180 1407)
Jet Airways - (1800 22 5522)
Spice Jet - (1800 180 3333)
Air India -- (1800 22 7722)
Kingfisher - (1800 180 0101)
Banks

ABN AMRO - (1800 11 2224)
Canara Bank - (1800 44 6000)
Citibank - (1800 44 2265)
Corporation Bank - (1800 443 555)
Development Credit Bank - (1800 22 5769)
HDFC Bank - (1800 227 227)
ICICI Bank - (1800 333 499)
ICICI Bank NRI - (1800 22 4848)
IDBI Bank - (1800 11 6999)
Indian Bank - (1800 425 1400)
ING Vysya - (1800 44 9900)
Kotak Mahindra Bank - (1800 22 6022)
Lord Krishna Bank - (1800 11 2300)
Punjab National Bank - (1800 122 222)
State Bank of India - (1800 44 1955)
Syndicate Bank - (1800 44 6655)
Automobiles

Mahindra Scorpio - (1800 22 6006)
Maruti - (1800 111 515)
Tata Motors - (1800 22 5552)
Windshield Experts - (1800 11 3636)
Computers/IT

Adrenalin - (1800 444 445)
AMD - (1800 425 6664)
Apple Computers - (1800 444 683)
Canon - (1800 333 366)
Cisco Systems - (1800 221 777)
Compaq - HP - (1800 444 999)
Data One Broadband - (1800 424 1800)
Dell - (1800 444 026)
Epson - (1800 44 0011)
eSys - (3970 0011)
Genesis Tally Academy - (1800 444 888)
HCL - (1800 180 8080)
IBM - (1800 443 333)
Lexmark - (1800 22 4477)
Marshal's Point - (1800 33 4488)
Microsoft - (1800 111 100)
Microsoft Virus Update - (1901 333 334)
Seagate - (1800 180 1104)
Symantec - (1800 44 5533)
TVS Electronics - (1800 444 566)
WeP Peripherals - (1800 44 6446)
Wipro - (1800 333 312)
Xerox - (1800 180 1225)
Zenith - (1800 222 004)
Indian Railway General Enquiry 131
Indian Railway Central Enquiry 131
Indian Railway Reservation 131
Indian Railway Railway Reservation Enquiry 1345,1335,1330
Indian Railway Centralised Railway Enquiry 1330/1/2/3/4/ 5/6/7/8/9

Couriers/Packers & Movers

ABT Courier - (1800 44 8585)
AFL Wizz - (1800 22 9696)
Agarwal Packers & Movers - (1800 11 4321)
Associated Packers P Ltd - (1800 21 4560)
DHL - (1800 111 345)
FedEx - (1800 22 6161)
Goel Packers & Movers - (1800 11 3456)
UPS - (1800 22 7171)
Home Appliances

Aiwa/Sony - (1800 11 1188)
Anchor Switches - (1800 22 7979)
Blue Star - (1800 22 2200)
Bose Audio - (1800 11 2673)
Bru Coffee Vending Machines - (1800 44 7171)
Daikin Air Conditioners - (1800 444 222)
DishTV - (1800 12 3474)
Faber Chimneys - (1800 21 4595)
Godrej - (1800 22 5511)
Grundfos Pumps - (1800 33 4555)
LG - (1901 180 9999)
Philips - (1800 22 4422)
Samsung - (1800 113 444)
Sanyo - (1800 11 0101)
Voltas - (1800 33 4546)
WorldSpace Satellite Radio - (1800 44 5432)
Investments/ Finance

CAMS - (1800 44 2267)
Chola Mutual Fund - (1800 22 2300)
Easy IPO's - (3030 5757)
Fidelity Investments - (1800 180 8000)
Franklin Templeton Fund - (1800 425 4255)
J M Morgan Stanley - (1800 22 0004)
Kotak Mutual Fund - (1800 222 626)
LIC Housing Finance - (1800 44 0005)
SBI Mutual Fund - (1800 22 3040)
Sharekhan - (1800 22 7500)
Tata Mutual Fund - (1800 22 0101)
Travel

Club Mahindra Holidays - (1800 33 4539)
Cox & Kings - (1800 22 1235)
God TV Tours - (1800 442 777)
Kerala Tourism - (1800 444 747)
Kumarakom Lake Resort - (1800 44 5030
Raj Travels & Tours - (1800 22 9900)
Sita Tours - (1800 111 911)
SOTC Tours - (1800 22 3344)
Healthcare

Best on Health - (1800 11 8899)
Dr Batras - (1800 11 6767)
GlaxoSmithKline - (1800 22 8797)
Johnson & Johnson - (1800 22 8111)
Kaya Skin Clinic - (1800 22 5292)
LifeCell - (1800 44 5323)
Manmar Technologies - (1800 33 4420)
Pfizer - (1800 442 442)
Roche Accu-Chek - (1800 11 4546)
Rudraksha - (1800 21 4708)
Varilux Lenses - (1800 44 8383)
VLCC - (1800 33 1262)
Insurance

AMP Sanmar - (1800 44 2200)
Aviva - (1800 33 2244)
Bajaj Allianz - (1800 22 5858)
Chola MS General Insurance - (1800 44 5544)
HDFC Standard Life - (1800 227 227)
LIC - (1800 33 4433)
Max New York Life - (1800 33 5577)
Royal Sundaram - (1800 33 8899)
SBI Life Insurance - (1800 22 9090)
Hotel Reservations

GRT Grand - (1800 44 5500)
InterContinental Hotels Group - (1800 111 000
Marriott - (1800 22 0044)
Sarovar Park Plaza - (1800 111 222)
Taj Holidays - (1800 111 825)
Teleshopping

Asian Sky Shop - (1800 22 1800)
Jaipan Teleshoppe - (1800 11 5225)
Tele Brands - (1800 11 8000)
VMI Teleshopping - (1800 447 777)
WWS Teleshopping - (1800 220 777)
Others

Domino's Pizza - (1800 111 123)
Cell Phones

BenQ - (1800 22 08 08)
Bird CellPhones - (1800 11 7700)
Motorola MotoAssist - (1800 11 1211)
Nokia - (3030 3838)
Sony
Ericsson - (3901 1111)

[TUT] Kill Mosquitoes with your Computer

It sounds strange but its true. Here is the way for you:

      Actually how it works.. Dragonflies are deadly enemies of Mosquitoes, cockroaches and those annoying insects..during there flight they generate a sound having frequency (approximately) between 67 Hz and 45 Hz, depending on their sizes.

So what are we going to do here is generating a sound of this frequency from our speakers which will keep them away and sound of this frequency also kills all those insect so it gonna work in this manner..


56 Hz is a good average number in between those frequencies. Your PC sound card and speakers will work well for this purpose. There are many sound and tone generator programs available on the internet for both the Mac and Windows PC. Setup your computer with the sound/tone generator program running and then play the sound through your computer speakers. The speakers can be aimed directionally for complete room coverage.

The sound level on the speakers should be adjusted so it is barely audible. This arrangement can be setup in a bedroom where you would like to have the window open but are worried about mosquitoes. One speaker should be fairly close to where you are sleeping.

Here are some links to more advanced tone generator software which can actually sweep between the 45 Hz and 67 Hz frequencies:

download from here for free: http://adf.ly/8m0q (Click on SKIP AD after opening the link)

u can also download this program free for this purpose : http://adf.ly/8m1H (Click on SKIP AD after opening the link)

So after downloading any of above program all what u have to do is install them .. play and set the sound between 67 Hz to 45 Hz and play.. that's it..

Saturday, October 15, 2011

[TECH] Google to close down Google Buzz

Google Friday announced to shut down the highly-controversial social networking product Google Buzz, along with several other services in the coming weeks, Xinhua reported. Google on its official blog, Google announced the death penalty to its code search engine, Buzz, Jaiku which let users send updates to friends, the Google personalised homepage feature iGoogle, and the University Research Program for Google Search.
The shut-downs came as part of Google's housecleaning effort announced in early September, in which the company said it will shut down a number of products and merging others into existing products as features.
"Changing the world takes focus on the future, and honesty about the past. We learned a lot from products like Buzz, and are putting that learning to work every day in our vision for products like Google+. Our users expect great things from us; today's announcements let us focus even more on giving them something truly awesome," said Google in the blog post.
Google Buzz, a social networking and messaging tool integrated into Gmail service, has been widely criticised for privacy concerns and held back the search giant from expanding its businesses to the social networking space.
After Buzz, Google launched Google+ in June, which has been receiving a good response and passed the 40 million user mark, the company's chief executive officer Larry Page said Thursday.

[MISC] Now pay $1.85 Lakh to own top level website Domain.

Internet Corporation for Assigned Names and Numbers (ICANN) on Friday said it will charge applicants $1,85,000 (about Rs 91 lakh) to get generic Top Level Domains (gTLDs) after it allowed expansion of suffixes for websites.

Top level domain names comprise letters that appear to the right of the last "dot" in a website like '.com' Presently , ICANN allows 22 suffixes on addresses such as .net, .com and .org.

"We will start accepting applications for gTLD from January 12 onwards. The rates of $1.85 lakh will be uniform for everyone who applies for it. We will evaluate all the applications received till April 12, 2012," ICANN President and CEO Rod Beckstrom told reporters here. 


Justifying the pricing, he said the amount has been calculated after consultations with various bodies across the world and included operational and litigation expenses . He added that in May, ICANN will publish the list of gTLDs received for public review. ICANN had recently announced opening up of registration of new internet domain names. Now, the domain names can consist of any word or words, in any language and any script, including Chinese or Japanese, giving unlimited options to internet users as they can even have a gTLD like .anything . This will help inclusion of words of Indian origin as well.

Formed in 1998, ICANN is a not-for-profit public-benefit corporation with participants from all over the world. "In case, anyone has an objection to it, they can write to us and we will follow the procedure to address the issues ," Beckstrom said.

He added that in cases, where there are multiple eligible applicants, ICANN may opt for auctioning those gTLDs. "However, in all the cases, we may not go for auction . If there are multiple applicants and one of the applicant represents larger community interest, the gTLD will be awarded to that applicant," Beckstrom said.

He said that ICANN has issued a guidebook, which an applicant can refer to for registering the gTLD.

"The guidebook, for example , says no country name, capitals (name) or city names can be applied for without letter of support from respective governments," Beckstrom said. ICANN has agreed to accept gTLD in seven Indian regional languages , N.Ravishankar, Additional Secretary. Department of Information Technology told reporters. It has also agreed to allocate '.Bharat' , in Hindi script, to India, he said. 

[TECH] Microsoft to put more money in Windows Phones


Since the release of the previous version last October, the Windows Phone has missed the company's sales expectations, and Microsoft has continued to lose ground to Apple Inc's iPhone and devices based on Google Inc's Android. Microsoft needs to do a better job of marketing the new software, which is much improved, said Michael Gartenberg, an analyst at Gartner Inc.
"From a technical perspective, it really does put them on par with the other competitors, but a lot of times Microsoft gets it right with the technology and then fumbles the marketing message," he said. Mobile-phone retailers haven't cooperated in the past, Gartenberg said. "If you went to store they showed you anything other than a Windows Phone. If you asked for a Windows Phone, they tried to talk you out of it."
Retail rules
Microsoft is especially reliant on the carriers' retail salespeople in the U.S., where more than 80 percent of phones are sold by stores owned by mobile operators, Lees said. In other countries, a larger percentage of handsets are sold by the phone makers themselves. He didn't specify what form the incentives might take.
Windows Phone 7.5, also known as Mango, was released last month to existing Windows handset customers. In addition to more aggressive marketing, Microsoft's partnership with Nokia Oyj will help sales, Lees said. Nokia announced earlier this year that it would base its handsets on Windows Phone software, a bid to reinvigorate its smartphone strategy. Nokia directly or indirectly controls more than 6,000 stores, Lees said.
Gartner forecasts that Microsoft will become the No. 2 smartphone operating system in 2015, with market share of 20 per cent. That would vault it past Apple's iOS, with Android remaining in the top spot. Achim Berg, head of Windows Phone marketing, said at a September conference in Berlin that the 20 percent share may be a conservative estimate.
First quarter
Next year, Microsoft will account for 11 percent of the market, up from 5.6 per cent this year, Gartner said in an April report. Lees declined to forecast numbers himself, except to say he expects market share to rise starting in the first quarter of 2012.
Manufacturers plan to produce a Windows phone that uses the high-speed wireless technology known as long-term evolution, or LTE, in the "not-too-distant future," Lees said. That will make mobile carriers more eager to promote the Windows Phone.
Cheaper models also will be produced, giving a boost to the operating system, Lees said. While handset makers and the carriers determine prices and subsidies, consumers should see Windows Phone devices for less than $100 in the US, he said.

[TECH] Five Annoying Things about IOS 5

1. Photos can't be deleted from Photo Stream
On the surface, Photo Stream is cool. Any snapshots I take on, say, my iPhone automatically get pushed to, say, my iPad. But guess what? You can't pick and choose which photos make it into your Stream--once the feature is enabled, it's all or nothing. (All new photos, that is; it doesn't pick up existing ones.)
Even worse, you can't remove a photo once it's been added. Even if I delete the pic from my iPhone Camera Roll, it remains in Photo Stream! The only way out, so to speak, is if it gets pushed out by newer snapshots (Apple stores your most recent 1,000 photos) or 30 days go by (that's how long each photo remains live). Alternately, you can turn off Photo Stream, which deletes all the photos. This is kind of a deal-breaker for me; I won't be using Photo Stream until Apple remedies this.
2. Wi-Fi Sync requires power
I've been waiting for Wi-Fi syncing ever since I experienced the feature on my Microsoft Zune. Apple's implementation works well enough--but only if your iDevice is connected to a power source. That means I either have to find my AC adapter (and tether myself to it), or connect my iPhone/iPad to the sync cable I use with my PC--which entirely defeats the purpose of wireless syncing!
Update: My bad. You do not need a power source to sync over Wi-Fi. Rather, automatic syncing happens when there's a power connection. I misread the description in the iOS 5 settings. What's more, Wi-Fi syncing wasn't working for me until I enabled it in iTunes.
Actually, it's nice that Wi-Fi syncing works in the background, meaning you can continue using your iDevice while it does its thing, but the power requirement is just plain annoying.
2. You can't put the Newsstand app inside a folder
What's that about, Apple? I may use Newsstand a bit on my iPad, but on my iPhone, I want to stick it inside my "Junk" folder, along with the smattering of other built-in apps I rarely use. Can't!
3. iCloud app management is a huge pain
iCloud comes with 5GB of free backup storage for your photos, documents, accounts, settings, and app data. Right from the get-go, my iPhone 4 had more data than would fit, so I ventured into the storage settings (Settings > iCloud > Storage & Backup > Manage Storage > This Phone) and discovered something kooky: iCloud wants to back up data for nearly every app on my phone. Like, Cooking Mama and Flixster and Songify.
Um, thanks, but no, I don't need to waste 9.5MB of iCloud storage on my kids' Cooking Mama scores. Or 57MB on whatever USA Today wants to back up. Or 230MB on my Audible books, which I can easily download again if I need to.
The problem is, you have to manually deselect all the apps you don't want to backup--an agonizingly slow process, because you have to confirm the "deletion" of each one. There must be a better way.
4. Marking e-mail "unread" now takes two taps
As someone who uses his inbox as a kind of to-do list, I like being able to mark an e-mail as unread by tapping "Mark as unread." In iOS 5, that option has been replaced by "Mark," which opens a box with two choices: "Flag" and "Mark as Unread." That's one extra step, one extra tap, for what used to be a simple operation.
Make no mistake, I like the new Flag option. But without some way to filter e-mail so that only flagged messages are shown, or to group all flagged messages at the top, it's not too useful.
5. Notification Center has no off switch
I usually read an e-book before bed, so my iPhone tends to spend the night on my nightstand. With iOS 4, I could set all notifications to off so I wouldn't be disturbed, but iOS 5 has no such option; you can only disable notifications for individual apps. Apple needs to let me turn off notifications during designated times.
In the end, I think that with iOS 5, Apple has sacrificed some of its vaunted simplicity. There are some great features here, no question, but I suspect a lot of users will find themselves yearning for instruction manuals that don't exist.
Is there anything about iOS 5 that's bugging you? Any changes or additions that you find confusing or unwanted? Share your gripes in the comments!

[TECH] IPhone 4S launch: Yep, it's selling like hotcakes..!!


First-day buyers today lined up at Apple retail locations and its carrier partner stores to get a first crack the latest iPhone. Some camped out overnight in San Francisco, while others in New York had set up shop even before the phone was announced.
Some even traveled around the world to get one, including Martin Gizemijter, who flew 11 hours from the Netherlands to pick up an iPhone from an Apple store in Pasadena, Calif., having done the same for the iPad 2's launch earlier this year.
"I've been awake for a long time," Gizemijter told CNET. "It's not a matter of being worth it," when asked about waiting in line. "It's not an intellectual decision. It's about the experience."
Whether the iPhone 4S could draw the same crowds as Apple's last iPhone was called into question after its unveiling last week, with some calling it an "underwhelming" update from Apple. The phone, which looks identical to the iPhone 4 on the outside, sports a faster processor, new antenna design, a better camera, and a sassy new voice assistant called Siri that can listen for, and respond to voice commands. Even with those additions, some found disappointment that Apple hadn't used the longer than usual time between models to come up with more of drastic change to its iPhone formula.
Early numbers proved that skepticism wrong though. Even before we get the number of iPhone 4S' Apple's sold on its opening weekend, which some analysts are estimating could reach as many as 4 million, the phone has already pushed past the device it's replacing in terms of early sales. Earlier this week Apple announced it had sold 1 million of the phones in the first 24 hours it was up for preorder, compared to 600,000 preorders for the iPhone 4. The phone also has the added benefit of being available on more carriers than its predecessor, as well as offering a third, top of the line model that boasts 64GB of built-in storage, and a $399 price tag.

[TUT] What are Proxy Servers? How to Enable Them?

What is a Proxy Server?

Proxy servers act as intermediary between the Remote Server and Client. When a Client requests a resource, it connects with the Proxy Server instead of directly connecting with the Server. Proxy Server downloads the requested resource or file from remote server and it is sent to the Client.

So, By using a Proxy Server, a client never comes in contact with remote server. Proxies are used to bypass the network in Schools, Colleges, Offices and Commercial places. Proxies are of following types:

  • Anonymous
  • Transparent
Anonymous: An Anonymous Proxy doesn't allow the remote server to identify the details of the Client.
Transparent: A Transparent Proxy allows the remote server to identify the details of the Client.

How to Setup Proxy Settings in any Web Browser.
  • For Mozilla Firefox:
  • Open your Mozilla Firefox browser and click on Tools button.
  • Select Options from the dropdown list.


  • Now click on Advanced Tab and select Network Tab.
  • Click on Settings button.
In the pop-up window select Manual Proxy Configuration. In the HTTP Proxy field give the IP address of the proxy server that use want to use and in the Port field give Port Number of the proxy server. Also put check mark on Use this proxy server for all protocols.
  • Click OK and then again on OK.
That’s it now you have set proxy settings and you can open any website whether it is blocked or not. If you want to undo these settings then do follow till fourth step. In fifth step choose No Proxy option and then click on OK.

For Google Chrome:-

  • Open you Chrome browser.
  • Click on Wrench Icon and select Options from the dropdown menu.

Now select Under the Hood option from the left window pane and in the Network section of right window pane click on the Change Proxy Settings.



Now select Connections Tab and then click on LAN Settings.


In the pop-up window put Check Mark on the Use a Proxy Server. In the Address field give the IP address of the proxy server that use want to use and in the Port field give Port Number of the proxy server.


  • Click OK and then again on OK.
That’s it now you have set proxy settings and you can open any website whether it is blocked or not. If you want to undo these settings then do follow till fourth step. In fifth step choose Automatically Detect Settings and then click on OK.

For Internet Explorer:-

  • Open your Internet Explorer browser and click on Tools button.
  • Select Internet Options from the dropdown menu.
Now select Connections Tab and then click on LAN Settings.

  • Click OK and then again on OK.
That’s it now you have set proxy settings and you can open any website whether it is blocked or not. If you want to undo these settings then do follow till third step. In fourth step put Check Mark on Automatically Detect Settings and click on OK.

Monday, October 10, 2011

Tips and Tricks for Protection Against Keyloggers






Keyloggers also known as key Stroke recorders are the softwares that can record the key strokes.These are Used in phishing websites to steal your username and password.These keylogger can also be installed on a computer and they can send usernames and passwords using your Internet connection.You can protect yourself using special tips and tricks.And if you follow the guidelines we are providing your username and password will be safe even if a keylogger has been already installed on your system.Here are the tips and tricks to protect yourself from the keyloggers


1.Enable Your Firewall:-
Firewalls donot stop the keyloggers from entering into your PC But hey can help in stopping the keyloggers from sending your information.It is always recommended that you install a good firewall software to protect your computer from unauthorized access.By default Microsoft windows firewall is enabled.

2.Use Good Antivirus Software And Avoid Downloading cracked Softwares:-
Use good antivirus softwares like Norton,mcafee or use the free ones like Avg,Avast,Avira.They certainly provide a lot of protection against keylogger.Using a special Antispyware program also helps.And avoid downloading softwares which have been cracked.Also avoid using torrents as much as you can because torrents is the hub of viruses and home of hackers.

Now Will Discuss How to Fool Keyloggers
If you believe that their is a keylogger in your system then you can do the following things to protect yourself
1.Instead of typing your username and password using your keyboard type it using On Screen Keyboard.On Windows Platform it can be opened By typing osk in run.
2.Type 2-3  random characters in your password field and then select it using your mouse,Now type your real password.This will add the random characters in front of the password recorded by keylogger and the keylogger is fooled by you for sending wrong password.
3.Keylogger runs in the background.Always check out for suspicious processes using task manger and end them.
This tips and tricks will help you out in protecting yourself from these harmful spywares

Hack Administrator Password in Windows 7, Vista, XP.(Working)



Most of us might be experienced a situation where we forgot our Administrator Password and we are not able to login to windows and access our necessary data. The only situation that comes in our mind is Fresh install of Windows. But this lead to loss our data. This is a way around which doesn't need you to install fresh copy of Windows. By this Simple tutorial you can Recover your Administrator Password. This tutorial is only for recovering the forgotten Administrator Password and not for Hacking purpose.

By this tutorial:
1.  You do not need to know your Old Administrator Password.
2. You can unlock Locked or Disable Accounts.
3. Also edit the Registry.

The Requirements are:
1. Blank CD-ROM.
2. Access to the Internet.
3. CD Writer.

Now here is the Step by Step Tutorial with Screenshots on how to Hack Administrator Password.

1. Download this Small Application
    CLICK HERE TO DOWNLOAD

2. You will get a zipped file with ISO Image in it. Extract this image using WinRAR or WinZip.
3. Now, Put the Blank CD-Rom in the Drive and Burn this Image properly using Nero or any other Burning Software.
4. Now put the CD in the system whose Password is to be Reset.
5. Restart your System, when Prompted press Enter.


Note:If you do not get prompt of boot from CD.Then restart you system and press f2 or f6 or f8 or Esc key(anyone of them should work for your system) before the booting of the windows start.Now you will enter into bios and you should change the boot order from here with the first preference as CD-ROM.And again restart your system
6.Now the software will load automatically.It will ask you to select the windows drive and after that provide you with the option of resetting password.
If you have any queries or suggestion do not hesitate to ask.

Trick to Convert Nokia Mobile into a WiFi Hotspot



Now you can use your 3G or Mobile internet on Computers using WiFi. There is an Application called JoikuSpot (for Nokia Phones) which will automatically convert your Phone into a WiFi Hotspot. It had been awarded the Best Application for Nokia in 2010.
           There is a free Version as well as a Premium Version. The Premium Version costs approx. Eur. 9.00 .

Here are the features of the Free Version:
1. With free Edition your Phone turns into a WiFi Hotspot with basic Protocol support.
2. New Simple WiFi Tethering UI connects your Computer or Laptop to Internet via your Phone Hotspot with a Click.
3. The Light Version is 100% Free. No obligations to purchase the Premium Edition.

Saturday, October 8, 2011

WinRAR v4.65 Full Free Download

Friday, October 7, 2011

Aakash - World's Cheapest Tablet






Indian government’s ultra low-cost tablet ‘Aakash’ is finally in front of us. The official launch comes after nearly one year telecom minister Kapil Sibal flaunted a prototype of the device. Previously nicknamed as ‘Sakshat’, the Aakash is being touted as the “world’s cheapest tablet”. The tablet is considered to be a significant accomplishment for the government, which believes the device will bridge the gap between the rural India and the ongoing technology boom in the country. Of late we have got several queries regarding the new Aakash tablet, so we’ve decided to give you a Facts post, which will help you find answers to most of your queries.
Availability:
The government will roll out 100,000 units of the Aakash tablet initially. The details of the availability of the device are bit sketchy. The government says it will distribute the device to students through the institutions they are studying. So, best way to find out exact availability of Aakash tablet is to contact your concerned department of your college/institution.
Commercially, the device will be launched in November. Pre-booking for the Aakash tablet (retail version is known as UbiSlate) has already started. For more info on pre-booking click Here


Price:-
Well, the Aakash tablet will be available for students at a subsidised price of nearly Rs. 1,730. However, the exact price of the Aakash is nearly Rs. 2,276, which the government paid for its procurement. As per the official website, the Aakash tablet a.k.a UbiSlate will be commercially available at Rs. 2,999.
Plans:-
As per official website, UbiSlate will come with an unlimited mobile Internet at Rs.98/month.

Features:-
  • High Quality Web Anytime & Anywhere:
  • Connect via GPRS or WiFi
  • GPRS: Embedded modem eliminates the need for external dongles and allows Internet access everywhere
  • WiFi: Allows fast Youtube videos at hotspots
  • Fast web access even on GPRS networks, across the country using DataWind’s patented acceleration technology
  • Web, Email, Facebook, Twitter and much much more!
  • Multimedia Powerhouse:
  • HD Quality Video
  • Watching movies in the palm of your hand on a 7” screen
  • Audio library software helps manage your full collection of songs
  • Applications Galore with Android 2.2:
  • Games
  • Productivity software: Office suite
  • Educational software
  • Over 150,000 apps!
  • Full sized-USB port & Micro-SD slot:
  • Expand memory to 32GB
  • Use any ordinary pen-drive
  • Even plug-in a 3G dongle
  • And It’s a Phone!
Configuration:-
Hardware:-
  • Processor: Connexant with Graphics accelerator and HD Video processor
  • Memory (RAM): 256MB RAM / Storage (Internal): 2GB Flash
  • Storage (External): 2GB to 32GB Supported
  • Peripherals (USB2.0 ports, number): 1 Standard USB port
  • Audio out: 3.5mm jack / Audio in: 3.5mm jack
  • Display and Resolution: 7” display with 800x480 pixel resolution
  • Input Devices: Resistive touch screen
  • Connectivity and Networking: GPRS and WiFi IEEE 802.11 a/b/g
  • Power and Battery: Up to 180 minutes on battery. AC adapter 200-240 volt range.
Software:-
  • OS: Android 2.2
  • Document Rendering
  • Supported Document formats: DOC, DOCX, PPT, PPTX, XLS, XLSX, ODT, ODP
  • PDF viewer, Text editor
  • Multimedia and Image Display
  • Image viewer supported formats: PNG, JPG, BMP and GIF
  • Supported audio formats: MP3, AAC, AC3, WAV, WMA
  • Supported video formats: MPEG2, MPEG4, AVI, FLV
  • Communication and Internet
  • Web browser - Standards Compliance: xHTML 1.1 compliant, JavaScript 1.8 compliant
  • Separate application for online YouTube video
  • Safety and other standards compliance
  • CE certification / RoHS certification
  • Other: Additional Web Browser: UbiSurfer-Browser with compression/acceleration and IE8 rendering.

Versions:-
Yes, there are two versions of the Aakash tablet. The subsidised Aakash tablet will miss few features such as inbuilt cellular modem and SIM to access Internet. The retail version is likely to sport full-fledged specs as announced by the government.
Developed by: The Aakash tablet is designed, developed and manufactured by a Canada-based firm called DataWind in co-ordination with IIT Rajasthan. According to reports, DataWind plans to launch a high end version of the device in less price sensitive markets such as the UK and US.

The World loses Steve Jobs? What happens Now??












Steve Jobs passed away peacefully, surrounded by his loved ones, on October 5, 2011. Although no official cause of death has been reported, Jobs had suffered from pancreatic cancer in the past and underwent a liver transplant in 2009. He stepped down from his role as Apple’s CEO in August due to his health problems, and when the news of his death hit the Internet, Apple posted a picture of him on their homepage (see above) alone with this simple message:
“Apple has lost a visionary and creative genius, and the world has lost an amazing human being. Those of us who have been fortunate enough to know and work with Steve have lost a dear friend and an inspiring mentor. Steve leaves behind a company that only he could have built, and his spirit will forever be the foundation of Apple.”
Jobs leaves behind his wife Laurene, the person he called the love of his life, along with four children.
But you know all this already.
I found out about Jobs’ death on Twitter, and for at least ten minutes, I don’t think I saw a single tweet that was about any other topic. His death took over the trending topics and, I’m guessing, is the reason why the fail whale came out to play for the first time in a long time. I saw messages of mourning from every corner of the world. One of my favorites (and I apologize that I can no longer find who originally tweeting this was “Stevie you’ll always be the apple of our i” and another, which I thought was beautifully perfect simply said “iSad.”
You don’t need another blog post to tell you that we’ve lost one of the greatest minds in the world, whether you are an Apple fan or not. Despite that fact, you’re here reading this, so I would like to pose a question to you instead: What happens now?
The world goes on. Despite the death of someone so world-changing, the earth won’t stop rotating. Even in our tech microcosm, life will continue. What happens now is that great people will go on to build upon the foundations that Jobs has given us to create things that even he couldn’t have imagined. Hundreds of years from now, new technology will be possible because of what Jobs did in his lifetime. What happens now is that we all are challenged to fill the gap, that hole created in the world when he passed away.
No one can replace the incredible Steve Jobs, but if we all try just a little bit harder to be amazing at what we’re doing in life, whether that’s blogging or social media or community management or raising llamas or driving race cars or something else…if we all try just a little bit harder, I think we’ll honor his memory well.
In closing, I’d like to leave you with a video of Jobs’ 2005 Commencement Speech to the students at Stanford. He was standing before that class to deliver his speech, but I feel as though maybe he was actually speaking to all of us.

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More