THESUNRAISING

Thursday, September 9, 2010

Secure your online username and password by typing with on-screen keyboard

key-loggers is the one of the problem for online users. It collect the information from keyboard-keystones form web browser or any other application and send it to the hackers who created it. There are many formats and ways to do it. it is in setup-file formate, web script and more... Most of the key-loggers attacked from web script hidden background and get the information which are typing in the text fields.




How it works:

Main function of this key-logger is it will collect the information by the help of keystones which are typing with keyboard. how it means each key have it own key sound or stone from that it will collect the information.

What's the use of On-screen keyboard:

First on-all we can open or execute form WindowsXP Start -->>All programms-->>Accessories-->> Easy of access and same as in vista and Windows 7. it will display as shown.
Start the typing with On-screen keyboard. first live your keyboard and type your user-name and password words with mouse clicks on On-screen keyboard by this only one mouse click sound or stone is records for all words to keyloggers by this use username and password is safe to record

Ok I think we are understand it and lets start to secure online typing information.


Monday, August 23, 2010

10 Ways Blogging Can Improve Your Life

1. Boost your confidence

Blogging’s easy and anyone can do it. With Wordpress or one of the other free blogging platforms and you can have your blog up and running in a few minutes. Anyone who thinks they don’t have the technical or writing skills will gain confidence once they set up a blog and see how easy it is to get started.

2. Have fun

People make jokes about bloggers like this one but I’m not ashamed to say I actually enjoy planning, researching, writing and maintaining my blog. It’s my baby and I can do anything with it I like. It’s not just me who enjoys it either, Chris Brogan wrote a post called I Love My Blog. Blogging really is fun and that’s probably why so many people are getting into it.

3. Be creative

We all need a creative outlet and blogging will allow you to explore, expand and experiment with your creative side. Keeping a blog isn’t just for writers either. You can use it to showcase your home improvement projects, paintings or herb garden and record and publish information via podcasts or video if those mediums hold more appeal for you.

4. Make friends

I didn’t start a blog to make friends and never expected to meet people through blogging but it just happens. Some blog visitors naturally relate to your blog content, they identify with you because of it and contact you. Thanks to my blog I’m in touch with people who I’d never have been in contact with otherwise. It still surprises me and the network of people you can engage with through blogging is a global one.

5. Improve your search engine ranking

If you have your own website adding a blog and updating it regularly could give you the edge over your competitors because the search engines prefer sites with new content. Of course you need to be writing about the topics your target audience will look for with the search engines to experience this benefit and you the more you write and the longer you keep updating your blog the greater the benefits.

6. Gain expert status

If you’re trying to establish a career or launch a new one maintaining a blog can position you as an expert. Having a website and blog is part of the package these days. Even if you want to get featured in the print press the first thing any journalist who wants to find out about you does is use the Internet. You want people who Google you to find your blog and not another website with information you have no control over.

7. Earn money

If you build up a sizeable readership you might be able to create a second income stream from your blog. Don’t give up your day job but if you’re passionate about your topic and believe it’s possible you may well be able to make it happen.

8. Plan better

A blog is a brilliant way to plan anything from a business to a book, a wedding to a wake. You could even use one a blog to plan a blog. Here’s how. Most Wordpress blogs have a categories section so if you’re collating information you can easily divide it into sections which make it easy for you to browse and locate information. You can then access that information any time from any place as long as you have access to a computer and the Internet. For example, a keen cook could use a blog to organise all her favourite recipes or a teacher could use it to keep ideas for lessons, organise lesson plans and keep notes on students. As a simple system for content management, blogs are invaluable.

9. Keep your mind active

Although you can easily start blogging right now by setting up a simple blog and telling people to visit it, most bloggers take a while to get good at blogging. There’s lots to learn and because the Internet is constantly evolving even professional bloggers who’ve been blogging for five years or longer are still learning new things about it. The good thing is that the learning curve isn’t too steep so you can set up a blog and learn as you go. The skills blogging will teach you such as writing, marketing, networking and computer literacy will come in useful in other areas of your life and constantly learning new things keeps your mind active and engaged.

10. Share your story

We all have a story to tell. At the very least blogging is a fabulous way of keeping a journal of your life, art, family, travels, hobbies or studies. It creates a permanent record you can look back on any time. Your kids might even find it interesting to look back on one day. Who knows, maybe the whole world will?

Blogging hasn’t just changed my life it’s enriched it. It’s changed the lives of well known bloggers like Chris Brogan, Leo Babauta, Brian Clark and Darren Rowse for the better too as well as countless other bloggers both professional and amateur. Are you ready to find out if it can improve your life?

How do you think blogging could benefit you?

Sunday, August 8, 2010

How to Convert Blu-ray to MKV

Problem

Blu-ray has great video and audio quality. But it's also discomfort to share Blu-ray video with others or watch on PC. So how to convert Blu-ray movie to MKV and keep the original quality?


Solution

1. Download and install any related softwares:MakeMKV, HandBrake, AnyDVD HD.

2. Launch MakeMKV. Choose your Blu-ray drive from the Source drop-down menu.



Hint: if MakeMKV can't read the Blu-ray Disc, you may need to run AnyDVD HD in the background. Please follow this recipe to learn how to decrypt Blu-ray disc: Remove Copy Protection from Blu-ray Discs.


3. Now choose the main movie, commonly the biggest title. Then keep one audio track as you like, AC3 DD Audio Track is quite well.



4.Click MakeMKV icon to save the output MKV file. It will need a lot of HDD space and take about one hour or so. You will see the converting process soon.



5.If you want to shrink the MKV video. Please run HandBrake. Load the MKV file from the Source->Video File. After that, choose the High Profile->Film Preset, then set the desired output file size and finally click Start to begin shrinking the MKV file.

Sunday, July 25, 2010

31 Proven Ways To Get More Comments On Your Blog

Do you want more comments on your blog? Let’s assume you already know how valuable comments are to your blogging experience. But how do you get more of them? Here are 31 ways to increase comments on your blog. Some are concepts I use regularly on my own blogs. Others I know about from watching other bloggers. (Note that I don’t necessarily endorse all methods. You have to decide what is right for you.)

1. Take a Stand – Most bloggers wallow in moral cowardice because they fear backlash. Take some time to outline your beliefs on an issue that matters to you and publish your thoughts. (Do this sooner rather than later. It’s best to get the mistakes out of the way while you have a smaller audience.) Readers love watching to see if you’ll lose your cool in the comments of a post. (You will the first few times. It comes with the territory.)
2. Ask For Help – Do you have a problem that you could use some help with? From athletes foot to banana bread, most readers are happy to look your question up in google and give you some resulting tips in a comment. (Asking for medical advice online is high on the scale of bad ideas unless it’s a medical community site…good for lots of comments and a follow-up post though!)
3. Attack Somebody – If you’ve got beef with somebody, publish it! Know the difference between a flagrant attack and a thoughtful post that calls another’s behaviors or beliefs into action. Both will get a lot of comments but the first might garner a lawsuit. (I call this an “attack” because readers will nearly always view a post that includes names as an attack even if the content is very much about a concept and not a person. Know what you’re stepping into.)
4. Congratulate Somebody – There’s a lot of arrogance online and any post that says, “I want you to check out this person and here’s why” will often win some comments about how much of a nice person you are. (Sure, you could be posting about somebody because you care about them…but there are many non-public ways to show you care that are often considered more meaningful. Go ahead and post to boost your own brand, just make sure you reach out to the people you care about in a genuine way.)
5. Link Up – It doesn’t take much time to incorporate a few links into your posts and most blog platforms automatically notify the sites you linked to. If you want to go the extra mile, take a quick look at the sites you’re linking to and use terms related to their sites in your links. This is a great way to get noticed by larger sites that know enough about SEO to appreciate your effort. (Know that any comments you get from big blogs you link to will often be short and add little to the conversation. They’re just tagging you back…which is the point of your links anyhow.)
6. Disappear – Most bloggers post too often. They start getting regular comments and decide to increase their posting schedule from weekly to twice weekly or even daily. If you’ve bludgeoned your readers with too much content lately, take a break. Disappear for a week or two and come back with a really thoughtful post. They’ll welcome you back with open arms. (Posting thoughtful content less frequently is a much better way to build a vibrant community than retching rubbish onto an RSS feed. The internet will be okay if you don’t post for a bit.)
7. Avoid Guest Posts – You’re not a genius editor with a huge network of willing writers who trust you to make sensible changes to their articles. Until that declaration no longer applies to you, hold off on the guest posts and focus on creating content that makes sense of your own ideas. (You can get the community jollies of guest posting by trading articles for edits/suggestions before posting your article on your own blog.)
8. Accept Guest Posts – If you can find somebody with a great social network who doesn’t blog regularly, ask them to write a guest post for your blog. They’ll be excited about posting on a blog and push their entire network to read and comment on the article. (Quality doesn’t matter so much. You’re just cashing in on the “first post” rush that every blogger gets on a new blog…except you’re hijacking it for your own blog. Snazzy!)
9. Try Different Media – If you always publish text posts, try making a video or drawing a cartoon to make your point. If you’ve been messing around with photoshop and have some cool cat-zebra mashups that you’re proud of, post away! (If you decide to do a video, PLEASE don’t begin with, “well, I wanted to talk to you about …. today.” Just get into your topic and rock it.)
10. Kill Your Retweet Button – Giving people an easy-out is, some would argue, a comment-killer. Give your readers only one way to respond and they’ll be more likely to take it. (This only works well if you’ve got amazing content and are hoping to snag the fence-sitting readers who know they want to respond but aren’t ready to commit to a comment.)
11. Kill Friendly Spam – Disqus, Chat Catcher, Twitback, etc all pull luscious bits of rubbish from various platforms and splooge them into your comment thread. Clear out the noise and let your readers know you’re serious about interaction and don’t just want to grease the slide for whatever comments come your way. (When readers think you value their input, they’re more likely to return and participate in multiple discussions on your blog.)
12. Add Friendly Spam – If you’re looking just to boost comment counts and not discussion quality, there are a lot of friendly spam-gathering plug-ins available to pull social media reactions into your comment thread. (If you’re of the “more is better no matter what” school of thought, this is probably the best route to getting your comment count up.)
13. Add a Retweet Button – If you’ve decided to go with #12, you’ll want to add the RT button so you can accelerate the Twitter-blog-Twitter visitor cycle. Every tweet is a “comment” so push, push! (I’m using an ordered list that makes me have a #13 and I’m pretending to be superstitious today….bear with me.)
14. Ask for comments - Email friends, beg on Facebook, promise to film naughty twitvid’s in exchange for comments. Remember when you posted your very first article and begged your friends to read it and comment? It works even better now that you’ve got some friends who actually know what a blog is! (This actually works. I had a friend email me earlier asking for a comment on an article she’d written that was in an area of interest for me. Guess what? I commented gladly!)
15. Close comments – Not on all of your posts. Just on some of them. If you post regularly but have trouble keeping interaction levels high, it might be a good idea to close comments on the blurbs and silly pieces so your readers know when you’d especially like their input. (If you’re a “social media blogger,” beware of closing comments. People will say you’re anti-interaction and throw moist cybertowelettes at you.)
16. Respond to comments – Seriously, if you’re deciding between leaving comments on another blog and responding to comments on your own blog, choose your blog. If you can’t carry a conversation in your own home it doesn’t make much sense to try and start them in other places. Responding to remarks on your own blog lets readers know that you are truly listening and care about what they have to say. Obviously, that will often lead to more comments and repeat visits. (Don’t look to “A-listers”–especially in social media–for examples of good behavior when it comes to comments. They’re busy doing other things.)
17. Extend Comments – If you get a bee in your bonnet while reading another blog, don’t waste your passion in a long comment. Put your thoughts into an article for your own blog and link back to it in a short comment on the post that inspired you. “Extending” a conversation in this way means more comments for everybody involved. (Linking back to the inspiring post is good business and makes up for any self-promotion you might have done in the comment that linked to your article.)
18. Write About Death – The deaths of blogging, twitter, social media, advertising, traditional media, and celebrities are all good comment-catching topics. Even a thoughtful post about death in general would do quite well as it’s something most of us think about on a regular basis. (Writing an article about how you wish death on a particular person is a bad idea.)
19. Write About Life – Find something that inspires you and write the living daylights out of it. Not only will you enjoy the process but readers will often pick up on your enthusiasm and choose to rock out with you in the comments section of your article. (If you’ve been writing about death recently, try stirring up the morgue with a few posts about thriving existence.)
20. Write About Your Fears – Is there something besides death, failure, and drowning that scares you? Fear is something we all have in different amounts regarding different things. If you have a morbid fear of choking on celery, open up and share it with your readers. Most won’t directly identify with your particular fear but, between the laughs and jokes, you’ll find a level of connection you’d miss out on with an article about your strengths. (Readers generally respond to articles that portray some sort of risk to the author. Take a risk and enjoy the comments!)
21. Write About A Failure – People love observing disasters. There’s nothing more enjoyable than reading about somebody crashing and burning when you know that they’re okay now so it’s alright to enjoy the story. “What I learned from burning my own house down” is a title sure to gather comments. (If it’s coupled with a post about the promised events.)
22. Curse Often – Shock and awe is a tactic used by many bloggers who have trouble producing quality content. You can often make up for bad writing by cursing a lot and using odd flips in logic to keep readers guessing and entertained. Readers who find you disgusting will comment as will all the readers who find you terribly amusing. Comments galore! (I don’t adopt this tactic personally but I know of many bloggers who use it regularly.)
23. Buy Comments – Using comments as a way to enter for a great prize is fail-safe way to get comments. If you want to force readers to surrender some value in exchange for your sweet schwag, make them respond to a thought-provoking question in their comment. (In spite of all the schwag hag hooplah circulating, I think give-aways can actually be leveraged into something that’s good for a blog-centric community.)
24. Start a Comment Cluster – Groups of bloggers who always comment on each other’s articles are great for higher comment counts. Coment clusters form naturally over time but can be built with a little push and thoughtful effort on your part. Start out with one blogger and work your way up until you’ve got 10-15 bloggers in your cluster. (This only works if you have a group of bloggers that post articles with the same frequency. Otherwise one blogger “gets” more out of the deal and things go sour.)
25. Trade Comments – Come right out and offer to leave a comment on any article chosen by readers who leave comments on your blog. Most comments are left out of either interest or a sense of reciprocity. Acknowledging the reciprocity and taking the initiative to leverage it into more comments for your blog is an effective way to boost comments. (Just be ready to read some really weird stuff and post comments on blogs you might not read otherwise.)
26. Write About Blogging – If you’ve come across something useful or have an idea about blogging in general, the blogging community is introspective enough to happily clamber all over your article. Blogging about writing often has similar results. There are so many different ways to go about writing articles and publishing them on the web that sharing your perspective is certain to garner some attention. (You don’t need to be terribly helpful or offer a lot of insight. Just tell things as you see them and your readers will invariably respond.)
27. Write About Twitter – It’s rare to find a regular Twitter user that doesn’t have an opinion or two about the service, company, or community that is Twitter. If you write an article about Twitter that fewer than 100 bloggers have written about already, you can be certain of comments from the Twitter-crazed masses. (Go overboard on this and you end up the mockery of your readers.)
28. Write Short Articles – A best-case scenario involves a visitor spending 3-5 minutes on your blog. That’s just enough time to read a 300 word article and craft a brief comment in response. Learn to pack a lot of goodness into a small space and you’ll reap the benefits of comments from joyful readers who gladly reply to your blurb with a comment.
29. Be Unexpected – Find a way to surprise your readers and they will always respond with a comment. How can you do this? Ask them to disagree with you or provide some evidence that you’re wrong about something. (Readers are often glad to disagree with you if they know you won’t take the disagreement personally. Surprise them with a welcome to disagree and watch the discussions pile up!)
30. Make Announcements – Marriage, weightloss, death, celebrations, etc. Announcements are great comment-getters for two reasons. 1. They’re usually quite short and to the point. 2. Readers don’t have to think long and hard about the appropriate response. (Make it easy for readers to contribute and they often will!)
31. Write For Yourself – The best way to get more comments than you know what to do with is to write articles that you personally find interesting. Use the social media platforms you enjoy most to share those articles with others and don’t stress out when comments don’t pile up on every article you publish. Life isn’t fair, the internet is full of weirdos, and it’s likely that your best article (in your estimation) will be one of your least-popular ones. (This is very true in my case.)

You may find some of these concepts boring and old hat. However, I’m hoping there are a few new thoughts in the mix that spark some ideas about how you can encourage your readers to interact with you more. Take the good bits home to your blog and play around with them. Find out what works best for you. A sustainable and interesting blog is one written by an author who truly takes joy in the blogging process. Best of luck!

Friday, July 23, 2010

15 Coolest Firefox Tricks Ever






Everybody’s favorite open-source browser, Firefox, is great right out of the box. And by adding some of the awesome extensions available out there, the browser just gets better and better.

But look under the hood, and there are a bunch of hidden (and some not-so-secret) tips and tricks available that will crank Firefox up and pimp your browser. Make it faster, cooler, more efficient. Get to be a Jedi master with the following cool Firefox tricks.

1) More screen space. Make your icons small. Go to View – Toolbars – Customize and check the “Use small icons” box.

2) Smart keywords. If there’s a search you use a lot (let’s say IMDB.com’s people search), this is an awesome tool that not many people use. Right-click on the search box, select “Add a Keyword for this search”, give the keyword a name and an easy-to-type and easy-to-remember shortcut name (let’s say “actor”) and save it. Now, when you want to do an actor search, go to Firefox’s address bar, type “actor” and the name of the actor and press return. Instant search! You can do this with any search box.

3) Keyboard shortcuts. This is where you become a real Jedi. It just takes a little while to learn these, but once you do, your browsing will be super fast. Here are some of the most common (and my personal favs):

* Spacebar (page down)
* Shift-Spacebar (page up)
* Ctrl+F (find)
* Alt-N (find next)
* Ctrl+D (bookmark page)
* Ctrl+T (new tab)
* Ctrl+K (go to search box)
* Ctrl+L (go to address bar)
* Ctrl+= (increase text size)
* Ctrl+- (decrease text size)
* Ctrl-W (close tab)
* F5 (reload)
* Alt-Home (go to home page)

4) Auto-complete. This is another keyboard shortcut, but it’s not commonly known and very useful. Go to the address bar (Control-L) and type the name of the site without the “www” or the “.com”. Let’s say “google”. Then press Control-Enter, and it will automatically fill in the “www” and the “.com” and take you there – like magic! For .net addresses, press Shift-Enter, and for .org addresses, press Control-Shift-Enter.

5) Tab navigation. Instead of using the mouse to select different tabs that you have open, use the keyboard. Here are the shortcuts:

* Ctrl+Tab (rotate forward among tabs)
* Ctrl+Shft+Tab (rotate to the previous tab)
* Ctrl+1-9 (choose a number to jump to a specific tab)

6) Mouse shortcuts. Sometimes you’re already using your mouse and it’s easier to use a mouse shortcut than to go back to the keyboard. Master these cool ones:

* Middle click on link (opens in new tab)
* Shift-scroll down (previous page)
* Shift-scroll up (next page)
* Ctrl-scroll up (decrease text size)
* Ctrl-scroll down (increase text size)
* Middle click on a tab (closes tab)

7) Delete items from address bar history. Firefox’s ability to automatically show previous URLs you’ve visited, as you type, in the address bar’s drop-down history menu is very cool. But sometimes you just don’t want those URLs to show up (I won’t ask why). Go to the address bar (Ctrl-L), start typing an address, and the drop-down menu will appear with the URLs of pages you’ve visited with those letters in them. Use the down-arrow to go down to an address you want to delete, and press the Delete key to make it disappear.

8) User chrome. If you really want to trick out your Firefox, you’ll want to create a UserChrome.css file and customize your browser. It’s a bit complicated to get into here, but check out this tutorial.

9) Create a user.js file. Another way to customize Firefox, creating a user.js file can really speed up your browsing. You’ll need to create a text file named user.js in your profile folder (see this to find out where the profile folder is) and see this example user.js file that you can modify. Created by techlifeweb.com, this example explains some of the things you can do in its comments.

10) about:config. The true power user’s tool, about.config isn’t something to mess with if you don’t know what a setting does. You can get to the main configuration screen by putting about:config in the browser’s address bar. See Mozillazine’s about:config tips and screenshots.

11) Add a keyword for a bookmark. Go to your bookmarks much faster by giving them keywords. Right-click the bookmark and then select Properties. Put a short keyword in the keyword field, save it, and now you can type that keyword in the address bar and it will go to that bookmark.

12) Speed up Firefox. If you have a broadband connection (and most of us do), you can use pipelining to speed up your page loads. This allows Firefox to load multiple things on a page at once, instead of one at a time (by default, it’s optimized for dialup connections). Here’s how:

* Type “about:config” into the address bar and hit return. Type “network.http” in the filter field, and change the following settings (double-click on them to change them):
* Set “network.http.pipelining” to “true”
* Set “network.http.proxy.pipelining” to “true”
* Set “network.http.pipelining.maxrequests” to a number like 30. This will allow it to make 30 requests at once.
* Also, right-click anywhere and select New-> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0″. This value is the amount of time the browser waits before it acts on information it receives.

13) Limit RAM usage. If Firefox takes up too much memory on your computer, you can limit the amount of RAM it is allowed to us. Again, go to about:config, filter “browser.cache” and select “browser.cache.disk.capacity”. It’s set to 50000, but you can lower it, depending on how much memory you have. Try 15000 if you have between 512MB and 1GB ram.

14) Reduce RAM usage further for when Firefox is minimized. This setting will move Firefox to your hard drive when you minimize it, taking up much less memory. And there is no noticeable difference in speed when you restore Firefox, so it’s definitely worth a go. Again, go to about:config, right-click anywhere and select New-> Boolean. Name it “config.trim_on_minimize” and set it to TRUE. You have to restart Firefox for these settings to take effect.

15) Move or remove the close tab button. Do you accidentally click on the close button of Firefox’s tabs? You can move them or remove them, again through about:config. Edit the preference for “browser.tabs.closeButtons”. Here are the meanings of each value:

* 0: Display a close button on the active tab only
* 1:(Default) Display close buttons on all tabs
* 2:Don’t display any close buttons
* 3:Display a single close button at the end of the tab bar (Firefox 1.x behavior)

Saturday, June 26, 2010

Compress Your 1 GB data/movie in Just 10 MB

It is Amazing to say compress ur 1GB data/move into 10MB. Really it is possible with the KGB Freeware (Open source) software. U can Down load the software from http://kgbarchiver.net/?page=download and fallow the following the steps.

Its damn simple..Heres the procedure.. U can compress that data in two formats..1) KGB format 2) ZIP format ..Everyone knows the ZIP format..I tell u which is better & why..If u do it in KGB format it takes 5-6 hours on a 256 mb RAM, to compress 1 GB data/movie in less than 10 MB , but (this is not which i prefer) coz to decompress u take the same time.. So its useless..& u need KGB archiver only only for this format to decompress..But if u do it in ZIP format it takes 6-7 hours on a 256 MB ram, but i tell u its worth coz WINRAR & WINZIP both can decompress it in seconds.. OK now its clear that which format to use & which is better..Now we'll go how to use that software..Run the application>> It asks for which file u wanna compress>> select the file>> after u select>> U get two options in which format u want to compress it>> select ZIP format ( I prefer ) >> and then set compression level to maximum (maximum the compression level , small the size of it will be compressed)>> Just ignore the time given below it coz its just useless....... There is option that u can auto shutdown ur computer after the compression is over..SO u can got school/college/office & keep it to get compressed.. I do the same..
[Note: KGB is best for 512 RAM and more then 2.xxGHz processer]

Tuesday, June 1, 2010

Kutti Pisasu - 2010 - [surthi DVD-rip | 700mb] ORIGINAL







Quote:
Movie : Kutti pisasu - {chiyaaN**}

Starring: Baby Keerthika, Ramji, Sangeetha, Ramya Krishnan, Ganja Karuppu.
Direction: Rama Narayanan
Music: Deva
Production: Rama Narayanan
Quote:


Review :

What better time to release a children’s flick than summer holidays? Well, it is a month late, many might think, the holidays have been on since April. Maybe the IPL played spoilsport. But, it is finally here and the kids can have a jolly good time in theaters – Kutty Pissasu releases this Friday.

If one remembers right, the last time an out-and-out children’s movie hit theaters was in December 2008 with Panchamirtham. Now, a year and a half later, we have a product from one of the most senior statesmen of Tamil cinema, Rama Narayanan. It is indeed amazing that the veteran still has it in him to direct full length feature films and it is even more awing to know that this is his 120th film. It is indeed rare to see directors who have gone on to do more than a 100 films and Rama Narayanan is one of them.

Kutty Pissasu is unambiguous about its target audience, the kids, who at this time might be getting bored with redundant TV programs, an overdose of





T20 or summer camps that are more tedious than school. Kutty Pissasu might be just the right antidote to all that boredom. Ramanarayanan has surely done his homework about the contemporary tastes of children. They are no longer interested in Vikram-Vethal kind of mythological stories or fables from Panchathanthra, they too want action like their seniors and that is why we have cartoons like Jetix flourishing. Kutty Pissasu will have a more hi-tech version of action, the giant robots from the Transformers. They will be playing a big (quite literally) part in the movie. That apart, there is the nice old good vs. evil backdrop in what looks like two forces (toddlers to be precise) are up in arms against each other, one being the Satan and the other the angel, we suppose.

The big highlight of Kutty Pissasu will definitely be the graphics in use. For a movie that has been conceived and fully executed in India, Kutty Pisau prima facie does seem to have set a pretty high standard for graphics, especially for a children’s film which is presumably shot on a budget that is not too large. Director Rama Narayanan must be applauded for making such an effort; the animation team too deserves a lot of credit. The film will definitely be a showcase of the local talent available when it comes to graphics and special effects.

With the summer holidays at their peak, children free from school and pretty good publicity, Kutty Pissasu does stand a chance of bringing in the kids (along with their parents) into theaters. Let’s hope that the children’s film genre receives a shot-in-the-arm through Kutty Pissasu.


DOWNLOAD LINK

Code :

PART 1
PART 2
PART 3
PART 4
PART 5
PART 6
PART 7

EACH LINK ARE 100MB.

After download use HJ SPLIT to JOIN
CLICK HERE TO DOWNLOAD LOCATION HJ SPLIT

Please leave a comment if you like this post!!!!!!

Thursday, May 20, 2010

Ravanan tamil latest song (A.R RAHMAN)






Movie Name : Raavanan
Cast : Vikram, Aishwarya Rai, Prithviraj Sukumaran, Prabhu
Music Director : AR Rahman
Director : Mani Ratnam
Lyrics : Vairamuthu
Year : 2010

Veera - Vijay Prakash, Keerthi Sagathia
Usure Pogudhey - Karthik
Kodu Poatta - Benny Dayal
Kaattu Sirukki - Shankar Mahadevan, Anuradha Sriram
Kalvare - Shreya Goshal
Kedakkari - Benny Dayal, Bhagyaraj, Rayhanah, Tanvi Singh

CLICK HERE FOR DOWNLOAD IN MEDIAFIRE

Wednesday, May 19, 2010

Singham MP3 SONG...




Movie Name : Singam
Cast : Surya, Anushka Shetty, Prakash Raj, Nassar, Vivek, Cameo, Manorama
Music Director : Devi Sri Prasad
Director : Hari
Lyrics : Viveka, Na Muthukumar, Hari
English Lyrics : Megha
Year : 2010

Naane Indhiran - Benny, Manickya Vinayagam
En Idhayam - Suchithra, Tippu
Stole My Heart - Shaan, Megha
Kadhal Vandhale - Baba Sehgal, Priyadharshini
Singam Singam - DSP, Megha
Stole My Heart (Unplugged) - Shaan

CLICK HERE FOR DOWNLOAD

Vinnaithaandi Varuvaaya BGM mp3 songs






Background Score Songs
Download-Vinnaithaandi-Varuvaaya-BGM-Background-Score-mp3-Songs
Movie Name : Vinnaithaandi Varuvaayaa BGM
Cast : Silambarasan, Trisha Krishnan
Music Director : AR Rahman
Director : Gautam Vasudev Menon

Title Track
Ulagathil
Karthiks Biodata
First Meet
Ganesh Sir Encourages Karthik
Watching Jessie Everyday
Jessie At Karthiks House
At KFC
At KFC II
You Are Like Brother
Karthik Proposed To Jessie
Found Jessie
Karthik Invited For Lunch At Jessies House
Having Lunch At Jessies House
Apologize To Jessie
Karthik Asking For Friendship
Why Did You Like Me Karthik
Karthik Narrating On How He Was Falled In Love
Bye Karthik
Arguing About Train Incident
Its A Fantastic Love Chemistry
Karthik Repropose To Jessie
Jessie Arguing
It Was Love In Train
Did You Like Me
Go For A Date
Let Us Be Friends Karthik
What You Trying To Prove Jessie
Dad I Wanna Live With Karthik
I Hate You
Fight With Jessies Brother
Parents Arguing
Again At Coffee Shop
Its All Over Now
Jessies Family Moving
At Church
The Bridal Is Coming
This Is My Treat For Passed In MCA Exam
Jessie Going Back To Home
Jessies Brother Saw Karthik In Bus
Jessies Brother Slaps Ganesh Sir
At Police Station
Going To Meet Jessie At Her House
Jessie Agreed That She Fall In Love
At Ganesh Sirs House
Missing Jessie At Goa
Karthik Messaging To Jessie
No Reply From Jessie
Jessies Ex-Bridegroom At House
Jessie Messaging To Karthik
Jessies Father Said No To Karthik
Jessie Cant Get To Contact Karthik
Karthik I Wanna Come With You
Going To Meet Jessie
Karthik In Jessies House At Night
No Match Between Us
Karthik Ive No Choice
Another Year Later
Karthik Meets Jessie Again
Describing About Jessie To Jessie
I Never Married Yet Karthik
Jessie - The Movie Ends
Talking At Cinema
It Was My Husband and I Liked The Climax
This Film Is For You Jessie
Movie Ends
Bonus Hosanna Long Version

CLICK HERE FOR DOWNLOAD

Tuesday, May 18, 2010

The Woman and the Machine

Aside from us there are angelic and demonic forces around that determine our faith.
The Machine lived with them for some time. According to classical theory it was a useful part of their life, but in the eye of the Woman who was a romantic to her very bones, it was merely a tolerated item, a poor relation. She looked down with piety on those who could become dependent upon a machine. Passion and dependence meant other things to her. She repeated these three words – passion, dependence, machine -- in her mind long enough that eventually she became tempted. She turned it ON.

Perhaps if she were familiar with the angelic and demonic forces that manipulate the world around us, perhaps then she would not have done it.

But she was not familiar. She hadn't seen “You've Got Mail” or read “The Bridges of Madison County,” she merely lived in the quiet, gray suburban loneliness. She didn't know, she didn't understand, merely felt.

She turned it ON. Trembling as with a first love. It was good. It was theater. She liked the theater, especially she liked the velvet curtains that could hide so many things. It was not the developments she liked so much, but rather the anticipation. It was not for the learning, the fulfillment but the pleasure of simply bathing in it that attracted her.

She opened velvet curtains one after another. There was magic before her eyes. She saw worlds, touched people and gained knowledge of things that were unfamiliar until then.
Seasons changed. The hibiscus brought forth a bud, a bloom then the flower dried and fell yet this time she didn't notice. Occasionally fragments of the real world did reach her. Requests, instructions, she performed her daily chores with head lowered and eyes closed as she continued to open curtains.

Then she found a spectacular one. A unique, tempting one that was the most beautiful among the others. She hesitated. She wanted to tear it open and consume what was behind it because she sensed that what was waiting for her behind it was seldom given to only a few. She was not greedy and open the curtain gently with the caress of her hand and there, awaiting her was LOVE.

She didn't want to object, just splashed in it and began to drown. As she was drowning she remembered that it takes three seasons for new life to begin. Sprint, Summer Fall. And water. In order for new life to spring forth, there needs to be water. Everything necessary was present here: the three seasons, water, love, pain….

And she was born.

But first she died, because if new life is brought forth someone has to go.

She was no longer surprised as she and the Machine sighed their last desire into the dark night.

Monday, May 3, 2010

NEVER BE SHY TO SAY YOUR LOVE THAT YOU LOVE




2 Friends - Couple

10th Grade

As I sat there in English class, I stared at the girl next to me. She was my so-called "best friend". I stared at her long, silky hair. I wished she were mine, but she didn't notice me like that.

And I knew it. After class she walked up to me and asked me for the notes she had missed the day before, and I handed them to her.

She said "thanks" and gave me a kiss on the cheek. I wanted to tell her. I wanted her to know that I don't want to be just friends. I love her, but I'm just too shy. And I don't know why.

11th Grade

The phone rang. It was her on the other end. She was in tears, mumbling on and on about how her love had broke her heart. She asked me to come over because she didn't want to be alone, so I did. As I sat next to her on the sofa, I stared at her soft eyes, wishing she was mine. After 2 hours, a Drew Barrymore movie, and three bags of chips, she decided to go to sleep. She looked at me, said "thanks," and gave me a kiss on the cheek. I want to tell her. I want her to know that I don't want to be just friends. I love her, but I'm just too shy. And I don't know why.

12th Grade

The day before prom she walked to my locker. "My date is sick," she said. He's not going to go. Well, I didn't have a date and in 7th grade we made a promise that if neither of us had dates we would go together just as "best friends," so we did.

Prom Night

After everything was over I was standing at her front door step. I stared at her. She smiled at me and stared at me with her crystal eyes. I want her to be mine, but she doesn't think of me like that, and I know it. Then she said, "I had the best time, thanks!" and gave me a kiss on the cheek. I want to tell her. I want her to know that I don't want to be just friends. I love her, but I'm just too shy. And I don't know why...

Graduation Day


A day passed. A week passed. A month passed. Before I could blink, it was graduation day. I watched as her perfect body floated like an angel up on stage to get her diploma. I wanted her to be mine, but she didn't notice me like that, and I knew it. Before everyone went home, she came to me in her smock and hat, and she cried as I hugged her. Then, she lifted her head from my shoulder and said, "You're my best friend, thanks!" and gave me a kiss on the cheek. I want to tell her. I want her to know that I don't want to be just friends. I love her, but I'm just too shy. And I don't know why?

A Few Years Later

Now, I sit in the pews of the church. She is getting married, now. I watched her say, "I Do" and drive off to her new life, married to another man. I wanted her to be mine but she didn't see me like that, and I knew it. But before she drove away, she came to me and said, "You came!" She said, "Thanks!" and kissed me on the cheek. I want to tell her. I want her to know that I don't want to be just friends. I love her, but I'm just too shy. And I don't know why...

Funeral


Years passed, and I looked down at the coffin of the girl who used to be my best friend. At the service they read a diary entry she had wrote in her high school years. This is what it read: "I stare at him wishing he were mine. But he doesn't notice me like that, and I know it. I want to tell him. I want him to know that I don't want to be just friends. I love him, but I'm just too shy, and I don't know why. I wish he would tell me he loved me?"

Monday, April 26, 2010

30 Amazing Facts About Internet & WWW

1. Since Google’s centerpiece in search technology was patented by Stanford University (on behalf of the founders Larry Page & Sergey Brin), Google gave Stanford 1.8 million shares for exclusive right to the patent that the university later sold for a staggering $336 million.

2. Google earns 97 percent of its revenues from advertising alone. This amounts to $20 billion.

3. Did you know that Google logs each search queries into its systems to enhance future searches?

4. They have found in user testing, that a small number of people are very typical of the larger user base. They run labs continually and always monitor how people use a page of results.

5. Google has the largest network of translators in the world; this is needed for continuously integrating searches and indexing web pages into their engine.

6. The reason Orkut doesn’t look or feel like a Google application was that the designer in-charge was given free reign to do things his way without the usual company procedures. Google is looking to improve Orkut’s resource utilization however.

7. Google makes small changes on their products very often. They sometimes try a particular feature with a set of users from a given network or region; for example Excite@Home users often get to see new features. They aren’t told of this, just presented with the new UI and observed how they use it.

8. The infamous “I feel lucky” is nearly never used. However, in traits it was found that removing it would somehow reduce the Google experience. Users wanted it to be kept. It was like a comfort button.

9. When Google was founded, Sergey Brin and Larry Page, the founders tossed a coin to decide what position they would take.

10. Notice the logos appearing on your Google homepage around major events or holidays? This is known as the Google Doodle. The first one was dedicated to the Burning Man festival in 1998. You can check out past Google doodles at google.com/logos.

11. By July 2008, Google had indexed an astounding 1 trillion (1000000000000) pages on the Internet.

12. Heard of Mentaplex? It was an April fool’s joke that Google could read peoples minds and search the Internet for what they were thinking of. The joke also included broadband access wires coming out from people’s toilet bowls! Try it out at http://www.google.com/mentalplex

13. Larry Page, the co founder of Google once made an inkjet printer out of Lego blocks when he was in college.

14. There are more then 600 million phones. Even then, more than half the population of the entire world hasn’t yet made a phone call.

15. All three founders of YouTube, Steve Chen, Chad Hurley and Jawed Karim were working for PayPal when they started YouTube.

16. Did you know that the domain YouTube.com was registered on Valentine's Day (February 14, 2005)

17. YouTube loves young Americans? Here’s proof: 70 percent of the YouTube’s registered users are from USA and half of YouTube users are under 20 years old.

18. If YouTube was Hollywood, they have enough material to release 60,000 new films every week.

19. One of the biggest leaps in Google’s search engine usage came about when they introduced their much improved spell checker giving birth to the “Did you mean…” This instantly doubled their traffic.

20. The total amount of bandwidth used by YouTube is about the same as used by entire Internet in 2000.

21. One needs over 1000 years of time to watch all videos on YouTube (but there will be billion of more videos uploaded on YouTube by then.)

22. Most popular category for uploder videos is ‘Music’ having around 20 percent YouTube videos.

23. Gmail was internally used for nearly 2 years prior to launch to the public. They discovered there were approximately 6 types of email users, and Gmail has been designed to accommodate all of these.

24. United States uses upload most of YouTube videos followed by UK. Americans are also the number-one watchers of YouTube videos followed by Japan.

25. The first ever video that was uploaded on YouTube is by Jawed Karim (one of YouTube founders) titled “Me at zoo” on April 23rd, 2005. This video is all of 18 seconds long.

26. There isn’t any restriction for proper dress code in the Google offices. This is to ensure comfort and a productive working environment. So one may dress up in pajamas or even as a superhero.

27. Tom Vendetta is the youngest Google employee ever hired. He was hired by Google when he was just 15 years old. Vendetta used to fool his friends by sending fake press releases and news. Vendetta was employed because he was young and would know young hackers thought. His job was to help address security flaws in Gmail.

28. Google consists of over 450,000 servers, racked up in clusters located in data centers around the world.

29. The first ever search engine was called “Archie” and was created way back in 1990 by a Canadian student Alan Emtage.

30. In 2007, Google became the most visited website with 700 million users. It beat the next popular website, Microsoft.com by over 200 million hits. In March 2010, Facebook overtook Google!

Tuesday, April 20, 2010

The History of Father's Day

Fathers DayFather's Day is a day of commemoration and celebration of Dad. It is a day to not only honor your father, but all men who have acted as a father figure in your life whether as Stepfathers, Uncles, Grandfathers or Big Brothers.

In the United States, the first modern Father's Day celebration was held on July 5, 1908, in Fairmont, West Virginia. It was first celebrated as a church service at Williams Memorial Methodist Episcopal Church South, now known as Central United Methodist Church. Grace Golden Clayton, who is believed to have suggested the service to the pastor, is believed to have been inspired to celebrate fathers after the deadly mine explosion in nearby Monongah the prior December. This explosion killed 361 men, many of them fathers and recent immigrants to the United States from Italy. Another possible inspiration for the service was Mother's Day, which had recently been celebrated for the first time in Grafton, West Virginia, a town about 15 miles away.

Another driving force behind the establishment of the integration of Father's Day was Mrs. Sonora Smart Dodd, born in Creston, Washington. Her father, the Civil War veteran William Jackson Smart, as a single parent reared his six children in Spokane, Washington. She was inspired by Anna Jarvis's efforts to establish Mother's Day. Although she initially suggested June 5, the anniversary of her father's death, she did not provide the organizers with enough time to make arrangements, and the celebration was deferred to the third Sunday of June. The first June Father's Day was celebrated on June 19, 1910, in Spokane, WA.

Unofficial support from such figures as William Jennings Bryan was immediate and widespread. President Woodrow Wilson was personally feted by his family in 1916. President Calvin Coolidge recommended it as a national holiday in 1924. In 1966, President Lyndon Johnson made Father's Day a holiday to be celebrated on the third Sunday of June. The holiday was not officially recognized until 1972, during the presidency of Richard Nixon.

In recent years, retailers have adapted to the holiday by promoting male-oriented gifts such as electronics, tools and greeting cards. Schools and other children's programs commonly have activities to make Father's Day gifts.

So, In short, Happy Fathers Day to all of you Dad's out there! Have a fun-filled day with your families and friends!

Monday, April 19, 2010

The history of Valentine's Day

The history of Valentine's Day — and its patron saint — is shrouded in mystery. But we do know that February has long been a month of romance. St. Valentine's Day, as we know it today, contains vestiges of both Christian and ancient Roman tradition. So, who was Saint Valentine and how did he become associated with this ancient rite? Today, the Catholic Church recognizes at least three different saints named Valentine or Valentinus, all of whom were martyred.

One legend contends that Valentine was a priest who served during the third century in Rome. When Emperor Claudius II decided that single men made better soldiers than those with wives and families, he outlawed marriage for young men — his crop of potential soldiers. Valentine, realizing the injustice of the decree, defied Claudius and continued to perform marriages for young lovers in secret. When Valentine's actions were discovered, Claudius ordered that he be put to death.

Other stories suggest that Valentine may have been killed for attempting to help Christians escape harsh Roman prisons where they were often beaten and tortured.

According to one legend, Valentine actually sent the first "valentine" greeting himself. While in prison, it is believed that Valentine fell in love with a young girl — who may have been his jailor's daughter — who visited him during his confinement. Before his death, it is alleged that he wrote her a letter, which he signed "From your Valentine," an expression that is still in use today. Although the truth behind the Valentine legends is murky, the stories certainly emphasize his appeal as a sympathetic, heroic, and, most importantly, romantic figure. It's no surprise that by the Middle Ages, Valentine was one of the most popular saints in England and France.

While some believe that Valentine's Day is celebrated in the middle of February to commemorate the anniversary of Valentine's death or burial — which probably occurred around 270 A.D — others claim that the Christian church may have decided to celebrate Valentine's feast day in the middle of February in an effort to "christianize" celebrations of the pagan Lupercalia festival. In ancient Rome, February was the official beginning of spring and was considered a time for purification. Houses were ritually cleansed by sweeping them out and then sprinkling salt and a type of wheat called spelt throughout their interiors. Lupercalia, which began at the ides of February, February 15, was a fertility festival dedicated to Faunus, the Roman god of agriculture, as well as to the Roman founders Romulus and Remus.

To begin the festival, members of the Luperci, an order of Roman priests, would gather at the sacred cave where the infants Romulus and Remus, the founders of Rome, were believed to have been cared for by a she-wolf or lupa. The priests would then sacrifice a goat, for fertility, and a dog, for purification.

The boys then sliced the goat's hide into strips, dipped them in the sacrificial blood and took to the streets, gently slapping both women and fields of crops with the goathide strips. Far from being fearful, Roman women welcomed being touched with the hides because it was believed the strips would make them more fertile in the coming year. Later in the day, according to legend, all the young women in the city would place their names in a big urn. The city's bachelors would then each choose a name out of the urn and become paired for the year with his chosen woman. These matches often ended in marriage. Pope Gelasius declared February 14 St. Valentine's Day around 498 A.D. The Roman "lottery" system for romantic pairing was deemed un-Christian and outlawed. Later, during the Middle Ages, it was commonly believed in France and England that February 14 was the beginning of birds' mating season, which added to the idea that the middle of February — Valentine's Day — should be a day for romance. The oldest known valentine still in existence today was a poem written by Charles, Duke of Orleans to his wife while he was imprisoned in the Tower of London following his capture at the Battle of Agincourt. The greeting, which was written in 1415, is part of the manuscript collection of the British Library in London, England. Several years later, it is believed that King Henry V hired a writer named John Lydgate to compose a valentine note to Catherine of Valois.

In Great Britain, Valentine's Day began to be popularly celebrated around the seventeenth century. By the middle of the eighteenth century, it was common for friends and lovers in all social classes to exchange small tokens of affection or handwritten notes. By the end of the century, printed cards began to replace written letters due to improvements in printing technology. Ready-made cards were an easy way for people to express their emotions in a time when direct expression of one's feelings was discouraged. Cheaper postage rates also contributed to an increase in the popularity of sending Valentine's Day greetings. Americans probably began exchanging hand-made valentines in the early 1700s. In the 1840s, Esther A. Howland began to sell the first mass-produced valentines in America.

According to the Greeting Card Association, an estimated one billion valentine cards are sent each year, making Valentine's Day the second largest card-sending holiday of the year. (An estimated 2.6 billion cards are sent for Christmas.)

Approximately 85 percent of all valentines are purchased by women. In addition to the United States, Valentine's Day is celebrated in Canada, Mexico, the United Kingdom, France, and Australia.

Valentine greetings were popular as far back as the Middle Ages (written Valentine's didn't begin to appear until after 1400), and the oldest known Valentine card is on display at the British Museum. The first commercial Valentine's Day greeting cards produced in the U.S. were created in the 1840s by Esther A. Howland. Howland, known as the Mother of the Valentine, made elaborate creations with real lace, ribbons and colorful pictures known as "scrap."

Sunday, April 18, 2010

How To Disable Right Click IN A Blogger - Easy Step

This post explains how to disable right click on blogger(blogspot) or any other webpage using a html(javascript) code.

It is so annoying if someone copies(thefts) your blog posts,articles,images and another kind of information owned by you saying that they are the original owners of the content.

But,I think 'disabling right click' is not the right solution for that.
Most people come to your site to read information and very small percentage of people come to your site to steal your work,images,etc.So,most people feel it insulting and I think it's very unprofessional thing to do.

If you want to protect your images,my suggestion is to add a Watermark(logo) of your sitename,or your name on the images,pictures,etc.

Note:Using this javascript code,you only disable the right click by warning the visitors that the content is copyrighted.

That's all my personal opinion,However if you despirately want to add this feauture,You can get this code here.


Where to paste it in blogger ?

Sign in to your blogger dashboad>layout>Add a Page element>html/javascript(look at the screenshot below)















and paste the below javascript code and Save the changes.

How it works?
If you right click on the webpage,a message will pop up on screen saying "function disabled".If you want to change the message to you own one like "sorry....the work is copyrighted" or something like that,replace the "funtion disabled" text with your own message in the Javascript code.

Saturday, April 17, 2010

Some Commonly Used Terms in Computers

Some Commonly Used Terms in Computers

Programme: It is a set of instructions given to the computer in a particular sequence for solving a given problem. In other words, it contains a set of actions to be performed by the computer on the data to produce necessary result. Programming is done in one of the computer languages.

Software: It is a collection of programmes written to bring the hardware of a computer system into operation. We cannot do any thing useful with the computer hardware on its own. It has to be driven by certain utility programmes called software which are stored in the computer system. There are two types of software:

1. Application Software: It refers to programmes or sets of programmes that perform a specific processing application, e.g., payroll and inventory control.
2. System Software: It consists of sets of programmes that act as an interface between the user and hardware, e.g., operating system like Windows, Mac OS, and UNIX etc.

Hardware: It is the term given to the machinery itself and to the various individual pieces of electronic equipment.

Liveware: The users working on the system are termed as ?liveware?.

Firmware: It is defined as software embedded into the hardware, e.g., ROM, which has the basic input-output system (BIOS).

Compiler: A programme which translates a high-level language programme into machine language.

Interpreter: A programme that translates each instruction of high level language and executes it before passing on to the next instruction.

Assembler: A programme which converts assembly language programme into machine language programme. It is system software.

Multiprocessing: In this of processing, the CPU has a number of processors which operate in parallel, thereby allowing simultaneous execution of several programmes.

Multiprogramming: This type of processing enables more than one programme to reside in the central memory at the same time, and share the available processor time and peripheral units.

Distributed Data Processing: It is also called decentralized processing. This approach involves using a network of computers interconnected by or minicomputer lines where each remote location has a small computer or minicomputer for input-output communication with a central computer and some local processing.

Bit: It is the basic unit of digital information. It can have only two values- one and zero.

Nibble: combination of four bits.

Byte: Combination of eight bits.

* 1 Kilobyte = 1024 bytes
* 1 Megabyte = (1024)x(1024) bytes
* 1 Gigabyte = (1024)x(1024)x(1024) bytes

Word: Combination of two or more than two bytes.

Database: It is a general collection of data shared by a variety of users. In particular, it has the following features:

* Redundancy of data is eliminated.
* Data is independent of any programme.
* Date is usable by many users, simultaneously.

Time Sharing: It is the concurrent use of a single computer system by many independent users. In time sharing, many terminals can be attached to a central computer. The terminal users can thus share time on the computer, that is, time sharing. The operating system can allocate the CPU time of the various users by giving each a time slice, each operating independently without awareness of use by others.

Microprocessor: It is a single chip based device, which is a complete processor in itself and is capable of performing arithmetic and logical operations.

Modem: An electronic device used to convert computer (digital) electronic signal to communication channel (analog) electronic signals and vice-versa. It is used in distributed data processing where terminals are joined by a telecommunication link to the host computer.

Change Details in Computer Folders

Change Details in Computer Folders

Have you ever needed specific information for one of your files or folders? Or, have you ever needed to change the details that are displayed in a folder? If you answered yes to either of those questions, this tip is for you! This tip show you how to change the list views for your files and folders in Windows XP. Let's go!

You can display files and folders in a variety of different ways, depending on what you want to see and do. When you view your files and folders in the Details mode, a default list of file and folder information appears, including the Name, Size, Type and Date Modified. But what if that default list doesn't provide the information you need? Well, you can add (or remove) as much information as you wish.

Here's how:

1. First, go to Start, My Documents.
2. Once you're there, single click on the file or folder you want to change.
3. Next, click on the View menu.
4. Scroll down and then click on Choose Details.

The Choose Details dialogue box will then appear.

5. You can now select the checkboxes with the details you want to include or you can clear out the ones you don't want.
6. Click the Move Up or Move Down buttons to change the order of the selected items.
7. Click the Show or Hide buttons to either show or hide the selected items.
8. When you're all set, just click OK.

That's it. You can now view your files and folders with the specific information you need!

Friday, April 16, 2010

Blu Ray Disc Technology

Blu Ray Disc Technology

Blu-ray, also known as Blu-ray Disc (BD), is the name of a next-generation optical disc format jointly developed by the Blu-ray Disc Association (BDA), a group of the world's leading consumer electronics, personal computer and media manufacturers (including Apple, Dell, Hitachi, HP, JVC, LG, Mitsubishi, Panasonic, Pioneer, Philips, Samsung, Sharp, Sony, TDK and Thomson). The format was developed to enable recording, rewriting and playback of high-definition video (HD), as well as storing large amounts of data. The format offers more than five times the storage capacity of traditional DVDs and can hold up to 25GB on a single-layer disc and 50GB on a dual-layer disc. This extra capacity combined with the use of advanced video and audio codecs will offer consumers an unprecedented HD experience.

Blu Ray Disc

While current optical disc technologies such as DVD, DVD±R, DVD±RW, and DVD-RAM rely on a red laser to read and write data, the new format uses a blue-violet laser instead, hence the name Blu-ray. Despite the different type of lasers used, Blu-ray products can easily be made backwards compatible with CDs and DVDs through the use of a BD/DVD/CD compatible optical pickup unit. The benefit of using a blue-violet laser (405nm) is that it has a shorter wavelength than a red laser (650nm), which makes it possible to focus the laser spot with even greater precision. This allows data to be packed more tightly and stored in less space, so it's possible to fit more data on the disc even though it's the same size as a CD/DVD. This together with the change of numerical aperture to 0.85 is what enables Blu-ray Discs to hold 25GB/50GB.

Blu-ray is currently supported by more than 170 of the world's leading consumer electronics, personal computer, recording media, video game and music companies. The format also has broad support from the major movie studios as a successor to today's DVD format. Seven of the eight major movie studios have already announced titles for Blu-ray, including Warner, Paramount, Fox, Disney, Sony, MGM and Lionsgate. The initial line-up is expected to consist of over 100 titles and include recent hits as well as classics such as Batman Begins, Desperado, Fantastic Four, Fifth Element, Hero, Ice Age, Kill Bill, Lethal Weapon, Mission Impossible, Ocean's Twelve, Pirates of the Caribbean, Reservoir Dogs, Robocop, and The Matrix. Many studios have also announced that they will begin releasing new feature films on Blu-ray Disc day-and-date with DVD, as well as a continuous slate of catalog titles every month.

Thursday, April 15, 2010

How to Love Someone

I once had a friend who grew to be very close to me. Once when we were sitting at the edge of a swimming pool, she filled the palm of her hand with some water and held it before me, and said this:

Water in Hands"You see this water carefully contained on my hand?" It symbolizes Love. "This was how I saw it. As long as you keep your hand caringly open and allow it to remain there, it will always be there. However, if you attempt to close your fingers round it and try to posses it, it will spill through the first cracks it finds."

This is the greatest mistake that people do when they meet love...they try to posses it, they demand, they expect... and just like the water spilling out of your hand, love will retrieve from you.

For love is meant to be free, you cannot change its nature. If there are people you love, allow them to be free beings.

* Give and don't expect.
* Advise, but don't order.
* Ask, but never demand.

It might sound simple, but it is a lesson that may take a lifetime to truly practice. It is the secret to true love. To truly practice it, you must sincerely feel no expectations from those who you love, and yet an unconditional caring."

Passing thought: Life is not measured by the number of breaths we take; but by the moments that take our breath away.....

Life is beautiful, Live it !!!

"If you love something, let it go. If it comes back to you (without you having to plead and beg), its yours forever. If it doesn't, then it was never meant to be."

50 most romantic things to do with your life-partner

1. Watch the sunset together.
2. Whisper to each other.
3. Cook for each other.
4. Walk in the rain.
5. Hold hands.
6. Buy gifts for each other.
7. Roses.
8. Find out their favorite cologne/perfume and wear it every time you're together.
9. Go for a long walk down the beach at midnight.
10. Write poetry for each other
11. Hugs are the universal medicine.
12. Say I love you, only when you mean it and make sure they know you mean it.
13. Give random gifts of flowers/candy/poetry etc.
14. Tell her that she's the only girl you ever want. Don't lie.
15. Spend every second possible together.
16. Look into each other's eyes.
17. Very lightly push up her chin, look into her eyes, tell her you love her, and kiss her lightly.
18. When in public, only flirt w/ each other.
19. Put love notes in their pockets when they aren't looking.
20. Buy her a ring.
21. Sing to each other.
22. Always hold her around her hips/sides.
23. Take her to dinner and do the dinner for two deal.
24. Spaghetti? (Ever see Lady and the Tramp?)
25. Hold her hand, stare into her eyes, kiss her hand and then put it over our heart.
26. Dance together.
27. Let your girl fall asleep with her head in your lap. (It looks real cute)
28. Do cute things like write I love you in a note so that they have to look in a mirror to read it.
29. Make excuses to call them every 5 minutes
30. Even if you are really busy doing something, go out of your way to call and say I love you.
31. Call from your vacation spot to tell them you were thinking about them.
32. Remember your dreams and tell her about them.
33. Always tell her how pretty she looks.
34. Tell each other your most sacred secrets/fears.
35. Be Prince Charming to her parents.
36. Brush her hair out of her face for her.
37. Hang out with his/her friends.
38. Go to church/pray/worship together.
39. Take her to see a romantic movie and remember the parts she liked.
40. Learn from each other and don't make the same mistake twice.
41. Describe the joy you feel just to be with him/her.
42. Make sacrifices for each other.
43. Really love each other, or don't stay together.
44. Let there never be a second during any given day that you aren't; thinking about them, and make sure they know it.
45. Love yourself before you love anyone else.
46. Learn to say sweet things in foreign languages.
47. Dedicate songs to them on the radio.
48. Fall asleep on the phone with each other.
49. Stand up for them when someone talks trash.
50. Never forget the kiss goodnight. And always remember to say, "Sweet dreams".

Love & Marriage - Difference in Love & Marriage

A student asks a teacher, "What is love?"

The teacher said, "in order to answer your question, go to the wheat field and choose the biggest wheat and come back.

But the rule is: you can go through them only once and cannot turn back to pick."

The student went to the field, go thru first row, he saw one big wheat, but he wonders... may be there is a bigger one later.

Then he saw another bigger one... But may be there is an even bigger one waiting for him.

Later, when he finished more than half of the wheat field, he start to realize that the wheat is not as big as the previous one he saw, he know he has missed the biggest one, and he regretted.

So, he ended up went back to the teacher with empty hand.

The teacher told him, "this is love... You keep looking for a better one, but when later you realise, you have already miss the person..."

"What is marriage then?" the student asked.

The teacher said, "in order to answer your question, go to the corn field and choose the biggest corn and come back. But the rule is: you can go through them only once and cannot turn back to pick."

The student went to the corn field, this time he is careful not to repeat the previous mistake, when he reach the middle of the field, he has picked one medium corn that he feel satisfy, and come back to the teacher.
The teacher told him, "This time you bring back a corn. You look for one that is just nice, and you have faith and believe this is the best one you get... This is marriage."

Swami Vivekananda's Speech in Chicago


WELCOME ADDRESS - Chicago, Sept 11, 1893


Sisters and Brothers of America,

It fills my heart with joy unspeakable to rise in response to the warm and cordial welcome which you have given us. I thank you in the name of the most ancient order of monks in the world; I thank you in the name of the mother of religions, and I thank you in the name of millions and millions of Hindu people of all classes and sects.

Swami VivekanandaMy thanks, also, to some of the speakers on this platform who, referring to the delegates from the Orient, have told you that these men from far-off nations may well claim the honor of bearing to different lands the idea of toleration. I am proud to belong to a religion which has taught the world both tolerance and universal acceptance. We believe not only in universal toleration, but we accept all religions as true. I am proud to belong to a nation which has sheltered the persecuted and the refugees of all religions and all nations of the earth. I am proud to tell you that we have gathered in our bosom the purest remnant of the Israelites, who came to Southern India and took refuge with us in the very year in which their holy temple was shattered to pieces by Roman tyranny. I am proud to belong to the religion which has sheltered and is still fostering the remnant of the grand Zoroastrian nation. I will quote to you, brethren, a few lines from a hymn which I remember to have repeated from my earliest boyhood, which is every day repeated by millions of human beings: "As the different streams having their sources in different paths which men take through different tendencies, various though they appear, crooked or straight, all lead to Thee."

The present convention, which is one of the most august assemblies ever held, is in itself a vindication, a declaration to the world of the wonderful doctrine preached in the Gita: "Whosoever comes to Me, through whatsoever form, I reach him; all men are struggling through paths which in the end lead to me." Sectarianism, bigotry, and its horrible descendant, fanaticism, have long possessed this beautiful earth. They have filled the earth with violence, drenched it often and often with human blood, destroyed civilization and sent whole nations to despair. Had it not been for these horrible demons, human society would be far more advanced than it is now. But their time is come; and I fervently hope that the bell that tolled this morning in honor of this convention may be the death-knell of all fanaticism, of all persecutions with the sword or with the pen, and of all uncharitable feelings between persons wending their way to the same goal.

Networking Concepts - Computer Networks

1. What are the two types of transmission technology available?

Broadcast and point-to-point

2. What is subnet?

A generic term for section of a large networks usually separated by a bridge or router.

3. Difference between the communication and transmission.

Transmission is a physical movement of information and concern issues like bit polarity, synchronisation, clock etc. Communication means the meaning full exchange of information between two communication media.

4. What are the possible ways of data exchange?

(1) Simplex (2) Half-duplex (3) Full-duplex.

5. What is SAP?

Series of interface points that allow other computers to communicate with the other layers of network protocol stack.

6. What do you meant by "triple X" in Networks?

The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between hte PAD and the network, called X.29. Together, these three recommendations are often called "triple X"

7. What is frame relay, in which layer it comes?

Frame relay is a packet switching technology. It will operate in the data link layer.

8. What is terminal emulation, in which layer it comes?

Telnet is also called as terminal emulation. It belongs to application layer.

9. What is Beaconing?

The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks.

10. What is redirector?

Redirector is software that intercepts file or prints I/O requests and translates them into network requests. This comes under presentation layer.

11. What is NETBIOS and NETBEUI?

NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications. NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets.

12. What is RAID?

A method for providing fault tolerance by using multiple hard disk drives.

13. What is passive topology?

When the computers on the network simply listen and receive the signal, they are referred to as passive because they don?t amplify the signal in any way. Example for passive topology - linear bus.

14. What is Brouter?

Hybrid devices that combine the features of both bridges and routers.

15. What is cladding?

A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.

16. What is point-to-point protocol?

A communications protocol used to connect computers to remote networking services including Internet service providers.

17. How Gateway is different from Routers?

A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats

18. What is attenuation?

The degeneration of a signal over distance on a network cable is called attenuation.

19. What is MAC address?

The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique.

20. Difference between bit rate and baud rate.

Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits.

baud rate = bit rate / N

where N is no-of-bits represented by each signal shift.

21. What is Bandwidth?

Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth.

22. What are the types of Transmission media?

Signals are usually transmitted over some transmission media that are broadly classified in to two categories.

a) Guided Media: These are those that provide a conduit from one device to another that include twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is directed and is contained by the physical limits of the medium. Twisted-pair and coaxial cable use metallic that accept and transport signals in the form of electrical current. Optical fiber is a glass or plastic cable that accepts and transports signals in the form of light.

b) Unguided Media: This is the wireless media that transport electromagnetic waves without using a physical conductor. Signals are broadcast either through air. This is done through radio communication, satellite communication and cellular telephony.

23. What is Project 802?

It is a project started by IEEE to set standards to enable intercommunication between equipment from a variety of manufacturers. It is a way for specifying functions of the physical layer, the data link layer and to some extent the network layer to allow for interconnectivity of major LAN protocols.

It consists of the following:

*
802.1 is an internetworking standard for compatibility of different LANs and MANs across protocols.
*
802.2 Logical link control (LLC) is the upper sublayer of the data link layer which is non-architecture-specific, that is remains the same for all IEEE-defined LANs.
*
Media access control (MAC) is the lower sublayer of the data link layer that contains some distinct modules each carrying proprietary information specific to the LAN product being used. The modules are Ethernet LAN (802.3), Token ring LAN (802.4), Token bus LAN (802.5).
*
802.6 is distributed queue dual bus (DQDB) designed to be used in MANs.

24. What is Protocol Data Unit?

The data unit in the LLC level is called the protocol data unit (PDU). The PDU contains of four fields a destination service access point (DSAP), a source service access point (SSAP), a control field and an information field. DSAP, SSAP are addresses used by the LLC to identify the protocol stacks on the receiving and sending machines that are generating and using the data. The control field specifies whether the PDU frame is a information frame (I - frame) or a supervisory frame (S - frame) or a unnumbered frame (U - frame).

25. What are the different type of networking / internetworking devices?

Repeater: Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link.

Bridges: These operate both in the physical and data link layers of LANs of same type. They divide a larger network in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and thus are repeaters that relay a frame only the side of the segment containing the intended recipent and control congestion.

Routers: They relay packets among multiple interconnected networks (i.e. LANs of different type). They operate in the physical, data link and network layers. They contain software that enable them to determine which of the several possible paths is the best for a particular transmission.

Gateways: They relay packets among networks that have different protocols (e.g. between a LAN and a WAN). They accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.

26. What is ICMP?

ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages.

27. What are the data units at different layers of the TCP / IP protocol suite?

The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or an user datagram, at the network layer the data unit created is called the datagram, at the data link layer the datagram is encapsulated in to a frame and finally transmitted as signals along the transmission media.

28. What is difference between ARP and RARP?

The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address of the receiver. The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.

29. What is the minimum and maximum length of the header in the TCP segment and IP datagram?

The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes.

30. What is the range of addresses in the classes of internet addresses?

1.
Class A 0.0.0.0 - 127.255.255.255
2.
Class B 128.0.0.0 - 191.255.255.255
3.
Class C 192.0.0.0 - 223.255.255.255
4.
Class D 224.0.0.0 - 239.255.255.255
5.
Class E 240.0.0.0 - 247.255.255.255

31. What is the difference between TFTP and FTP application layer protocols?

The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP.

The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offer by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information.

32. What are major types of networks and explain?

*
Server-based network
*
Peer-to-peer network

Peer-to-peer network, computers can act as both servers sharing resources and as clients using the resources. Server-based networks provide centralized control of network resources and rely on server computers to provide security and network administration.

33. What are the important topologies for networks?

1.
BUS topology: In this each computer is directly connected to primary network cable in a single line.
Advantages: Inexpensive, easy to install, simple to understand, easy to extend.
2.
STAR topology: In this all computers are connected using a central hub.
Advantages:Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems.
3.
RING topology: In this all computers are connected in loop.
Advantages: All computers have equal access to network media, installation can be simple, and signal does not degrade as much as in other topologies because each computer regenerates it.

34. What is mesh network?

A network in which there are multiple network links between computers to provide multiple paths for data to travel.

35. What is difference between baseband and broadband transmission?

In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.

36. Explain 5-4-3 rule?

In a Ethernet network, between any two points on the network ,there can be no more than five network segments or four repeaters, and of those five segments only three of segments can be populated.

37. What MAU?

In token Ring , hub is called Multistation Access Unit (MAU).

38. What is the difference between routable and non- routable protocols?

Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router.

39. Why should you care about the OSI Reference Model?

It provides a framework for discussing network operations and design.

40. What is logical link control?

One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard. This sublayer is responsible for maintaining the link between computers when they are sending data across the physical network connection.

41. What is virtual channel?

Virtual channel is normally a connection from one source to one destination, although multicast connections are also permitted. The other name for virtual channel is virtual circuit.

42. What is virtual path?

Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path.

43. What is packet filter?

Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped.

44. What is traffic shaping?

One of the main causes of congestion is that traffic is often busy. If hosts could be made to transmit at a uniform rate, congestion would be less common. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate. This is called traffic shaping.

45. What is multicast routing?

Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing.

46. What is region?

When hierarchical routing is used, the routers are divided into what we will call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions.

47. What is silly window syndrome?

It is a problem that can ruin TCP performance. This problem occurs when data are passed to the sending TCP entity in large blocks, but an interactive application on the receiving side reads 1 byte at a time.

48. What are Digrams and Trigrams?

The most common two letter combinations are called as digrams. e.g. th, in, er, re and an. The most common three letter combinations are called as trigrams. e.g. the, ing, and, and ion.

49. Expand IDEA?

IDEA stands for International Data Encryption Algorithm.

50. What is wide-mouth frog?

Wide-mouth frog is the simplest known key distribution center (KDC) authentication protocol.

51. What is Mail Gateway?

It is a system that performs a protocol translation between different electronic mail delivery protocols.

52. What is IGP (Interior Gateway Protocol)?

It is any routing protocol used within an autonomous system.

53. What is EGP (Exterior Gateway Protocol)?

It is the protocol the routers in neighboring autonomous systems use to identify the set of networks that can be reached within or via each autonomous system.

54. What is autonomous system?

It is a collection of routers under the control of a single administrative authority and that uses a common Interior Gateway Protocol.

55. What is BGP (Border Gateway Protocol)?

It is a protocol used to advertise the set of networks that can be reached with in an autonomous system. BGP enables this information to be shared with the autonomous system. This is newer than EGP (Exterior Gateway Protocol).

56. What is Gateway-to-Gateway protocol?

It is a protocol formerly used to exchange routing information between Internet core routers.

57. What is NVT (Network Virtual Terminal)?

It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session.

58. What is a Multi-homed Host?

It is a host that has a multiple network interfaces and that requires multiple IP addresses is called as a Multi-homed Host.

59. What is Kerberos?

It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files.

60. What is OSPF?

It is an Internet routing protocol that scales well, can route traffic along multiple paths, and uses knowledge of an Internet's topology to make accurate routing decisions.

61. What is Proxy ARP?

It is using a router to answer ARP requests. This will be done when the originating host believes that a destination is local, when in fact is lies beyond router.

62. What is SLIP (Serial Line Interface Protocol)?

It is a very simple protocol used for transmission of IP datagrams across a serial line.

63. What is RIP (Routing Information Protocol)?

It is a simple protocol used to exchange information between the routers.

64. What is source route?

It is a sequence of IP addresses identifying the route a datagram must follow. A source route may optionally be included in an IP datagram header.