Thursday, April 24, 2008
go to desktop->My computer-(right click on)->properties->then go HARDWARE tab->Device manager-> now u see a window of Device manager
then go to Ports->Communication Port(double click on it and Open).
after open u can see a Communication Port properties.
go the Port Setting:----
and now increase ur "Bits per second" to 128000.
and "Flow control" change 2 Hardware.
apply and see the result
please comment me.
Result in Excel 2000 - General
|F2 Key||Edit current Cell|
|F7 Key||Spell Check|
|F12 Key||Save file as|
|CTRL and A||Select entire worksheet.|
|CTRL and B||Toggle Bold Text.|
|CTRL and C||Copies the item or items selected to the Clipboard and can be pasted using CTRL and V.|
|CTRL and F||Displays the Find dialog box.|
|CTRL and H||Displays the Replace dialog box.|
|CTRL and I||Toggles Italic Text.|
|CTRL and N||New File.|
|CTRL and O||Open File.|
|CTRL and P||Print.|
|CTRL and S||Save File.|
|CTRL and U||Toggles Underlined Text.|
|CTRL and V||Paste the contents of the clipboard.|
|CTRL and X||Cut the selected item.|
|CTRL and Y||Redo the last undone action|
|CTRL and Z||Undoes the last action.|
|CTRL and 1||Displays Format Cells Dialogue Box|
|CTRL and 5||Toggles Strikethrough Text|
Result in Excel 2000 - Formulas
|ALT and =||Autosum|
|ALT and F8||Macros|
|CTRL and ;||Insert Current Date|
|CTRL and :||Insert Current Time|
Result in Excel 2000 - Movement
|Left Arrow||One Cell Left (also SHIFT and TAB)|
|Right Arrow||One Cell Right (also TAB)|
|Up Arrow||One Cell Up|
|Down Arrow||One Cell Down|
|Home||Go to End of row|
|CTRL and left Arrow||Go to End of Column|
|CTRL and Home||Go to Top of Worksheet (A1)|
|CTRL and End||Go to End of Worksheet|
|CTRL and PAGE-DOWN||Go to Next Worksheet|
Result in Excel 2000 - Cell Selection
|CTRL and Spacebar||Select the entire Column|
|SHIFT and Spacebar||Select the entire Row|
|CTRL and A||Select Entire Worksheet|
|SHIFT and Left Cursor||Select all cells to the left of the active one|
|SHIFT and Right Cursor||Select all cells to the right of the active one|
|CTRL + A||Select all text on a webpage|
|CTRL + B||Open the Bookmarks sidebar|
|CTRL + C||Copy the selected text to the Windows clipboard|
|CTRL + D||Bookmark the current webpage|
|CTRL + F||Find text within the current webpage|
|CTRL + G||Find more text within the same webpage|
|CTRL + H||Opens the webpage History sidebar|
|CTRL + I||Open the Bookmarks sidebar|
|CTRL + J||Opens the Download Dialogue Box|
|CTRL + K||Places the cursor in the Web Search box ready to type your search|
|CTRL + L||Places the cursor into the URL box ready to type a website address|
|CTRL + M||Opens your mail program (if you have one) to create a new email message|
|CTRL + N||Opens a new Firefox window|
|CTRL + O||Open a local file|
|CTRL + P||Print the current webpage|
|CTRL + R||Reloads the current webpage|
|CTRL + S||Save the current webpage on your PC|
|CTRL + T||Opens a new Firefox Tab|
|CTRL + U||View the page source of the current webpage|
|CTRL + V||Paste the contents of the Windows clipboard|
|CTRL + W||Closes the current Firefox Tab or Window (if more than one tab is open)|
|CTRL + X||Cut the selected text|
|CTRL + Z||Undo the last action|
|F1||Opens Firefox help|
|F3||Find more text within the same webpage|
|F5||Reload the current webpage|
|F6||Toggles the cursor between the address/URL input box and the current webpage|
|F7||Toggles Caret Browsing on and off. Used to be able to select text on a webpage with the keyboard|
|F11||Switch to Full Screen mode|
Do you share a computer with other users and want some extra security on your folders? There are two ways to password protect a folder built into Windows XP (for other Windows flavors, there are some freeware/shareware programs out there).
#1 If you have a log in password for your account, this can be used to protect folders from other users. Your hard drive must be formatted using NTFS (which it probably is unless you're dual booting with another operating system). Here's what to do...
Right-click the folder that you want to make private and choose "Properties" (or Alt+Double-click). Go to the "Sharing" tab and check the "Make this folder private" box.
Click Apply . If you do not have a password on your account, a box will pop up asking if you want to assign a password. This must be done if you want to make the folder private, so click Yes . You will need to use your password to log on to your computer from then on.
Type in a password then confirm it. Click the "Create Password" button then close the Password window.
Click OK in the Properties dialog box.
Now anyone else logged on to your computer can't access that file without knowing your password.
#2 If the Folder is Zipped you can give it a unique password.
Just double-click the zipped folder. In the top menu select File then click "Add a Password".
Type a password into the Password box. Then again in the "Confirm Password" box.
Now, you are the only person who can access files in this folder. The folder can be opened allowing the files to be seen, but you are the only one who can access them.
Don't you feel more secure now?
|CTRL + B||Moves the cursor backward one character.|
|CTRL + C||Cancels the currently running command.|
|CTRL + D||Logs out of the current session.|
|CTRL + F||Moves the cursor forward one character.|
|CTRL + H||Erase one character. Similar to pressing backspace.|
|CTRL + P||Paste previous line and/or lines.|
|CTRL + S||Stops all output on screen (XOFF).|
|CTRL + Q||Turns all output stopped on screen back on (XON).|
|CTRL + U||Erases the complete line.|
|CTRL + W||Deletes the last word typed in. For example, if you typed 'mv file1 file2' this shortcut would delete file2.|
|CTRL + Z||Cancels current operation, moves back a directory and/or takes the current operation and moves it to the background. See bg command for additional information about background.|
In addition to the below command line shortcuts, it is also helpful to use the alias command that allows you to specify a keyword for frequently used commands or mistakes.
|~||Moves to the user's home directory.|
|!!||Repeats the line last entered at the shell. See history command for previous commands.|
|!$||Repeats the last argument for the command last used. See history command for previous commands.|
|reset||Resets the terminal if terminal screen is not displaying correctly.|
|shutdown -h now||Remotely or locally shuts the system down.|
I think many users are worried about the security of their file and folder also, so another benefit of this feature, you can protect your compressed file and folders with password.
Follow the given steps to implement the compression and password feature to mange data:
First double click on "My Computer" and locate the disk where you want to create compressed (zipped) folder. For example, if you want to create this compressed (zipped) folder on C drive, then open C drive.
Here open the "File" menu, go to "New" then click on "Compressed (zipped) Folder" option.
Rename this folder according to data information and press "Enter" button.
Now you can move (drag and drop or copy and paste) your files,
and folders to this compressed (zipped) folder then compression feature will implement automatically on that data.
When you want to open these compressed files, simple right click on compressed folder and click on Extract All. This extract wizard will automatically extract all these files to location you choose.
Now if you want to protect this compressed folder with password, simply open the compressed folder and go to "File" menu then here click on "Add a Password" option.
A small dialog box will appear with title "Add Password", type password in "Password" box and confirm password also then press Ok button.
Now when you will try to open your compressed files, system will prompt you a dialog box to enter password to open this file.
Monday, April 21, 2008
Try these easy Firefox tweaks and you’ll see that you’re surfing the Internet from 3 to 30 times faster!
To get started, open your Firefox web browser. In the address/location bar type [about:config] and then press your Enter key. (NOTE: DON’T TYPE THE BRACKETS.)
In the Filter bar type [network.http.pipelining]. Then, double-click on this line under Preference Name in order to change the value from false to true.
In the Filter bar type [network.http.pipelining.maxrequests]. Then, double-click on this line under Preference Name and change the value from 4 to a higher number anywhere from 10 to 30. I set mine to 30.
In the Filter bar type [network.http.proxy.pipelining]. Then, double-click on this line under Preference Name in order to change the value from false to true.
In the Filter bar type [network.dns.disableIPv6]. Then, double-click on this line under Preference Name in order to change the value from false to true.
In the Filter bar type [plugin.expose_full_path]. Then, double-click on this line under Preference Name in order to change the value from false to true.
In the Filter bar type [network.protocol-handler.external.ms-help]. Now, you are going to create a new Preference Name with an Integer Value. To do this, right-click on this line under Preference Name and select New, then Integer.
In the New Integer value box type in [nglayout.initialpaint.delay] and click OK. Then in the Enter Integer value box type  (that’s a zero) and click OK.
In the Filter bar again type [network.protocol-handler.external.ms-help]. Now, you are going to create another new Preference Name with an Integer Value. To do this, right-click on this line under Preference Name and select New, then Integer. In the New Integer value box type in [content.notify.backoffcount] and click OK. Then in the Enter Integer value box type  and click OK.
In the Filter bar again type [network.protocol-handler.external.ms-help]. Now, you are going to create another new Preference Name with an Integer Value. To do this, right-click on this line under Preference Name and select New, then Integer. In the New Integer value box type in [ui.submenuDelay] and click OK. Then in the Enter Integer value box type  (that’s a zero) and click OK.
Now, close your web browser and restart it. You’ll see how much faster web pages are loading. I sure did.
Let me know if these tweaks increase your Internet browsing speed. Know of any other tweaks or tricks? Let me know and I’ll add them.
Below is a listing of general tips that should be taken when cleaning any of the components or peripherals of a computer as well as tips to help keep a computer clean.
- Never spray or squirt any type of liquid onto any computer component. If a spray is needed, spray the liquid onto a cloth and then use that cloth to rub down the component.
- Users can use a vacuum to suck up dirt, dust, or hair around their computer on the outside case and on their keyboards. However, do not use a vacuum for the inside of your computer as it generates a lot of static electricity that can damage the internal components of your computer. If you need to use a vacuum to clean the inside of your computer, use a portable battery powered vacuum designed to do this job.
- When cleaning a component and/or the computer, turn it off before cleaning.
- Never get any component inside the computer or any other circuit board damp or wet.
- Be cautious when using any type of cleaning solvents; some individuals may have allergic reactions to chemicals in cleaning solvents and some solvents can even damage the case. Try to always use water or a highly diluted solvent.
- When cleaning, be careful not to accidentally adjust any knobs or controls. In addition, when cleaning the back of the computer, if anything is plugged in, make sure not to disconnect any of the plugs.
- When cleaning fans, especially the smaller fans within a portable computer or laptop it's suggested that you either hold the fan or place something in-between the fan blades to prevent it from spinning. Spraying compressed air into a fan or cleaning a fan with a vacuum may cause damage to some fans or in some cases cause back voltage.
- Never eat or drink around the computer.
- Limit smoking around the computer.
* Windows key - access Start menu
* Windows key + Pause - open System Properties
* Windows key + D - minimise/restore windows
* Windows key + F - open Search window
* Windows key + F1 - open Help and Support Center
* Windows key + E - open Windows Explorer window
* Windows key + M - minimise all windows
* Windows key + TAB - move through open windows on Taskbar
* Windows key + SHIFT + M - restore all windows
* Hold CTRL while dragging - make a copy of selected item
* Hold CTRL + SHIFT while dragging - make a shortcut to selected item
* CTRL + ESC - open Start menu
* CTRL + C - Copy
* CTRL + X - Cut
* CTRL + V - Paste
* CTRL + A - Select All
* CTRL + Z - Undo
* CTRL + B - Bold highlighted text
* CTRL + U - Underline highlighted text
* CTRL + I - Italicise highlighted text
* CTRL + Plus key - increase browser text size
* CTRL + Minus key - decrease browser text size
* CTRL + ALT + DELETE - open Task Manager
* ALT + underlined letters in menus - open menu item
* ALT + ENTER - show Properties of selected object
* ALT + F4 - close current window or program
* CTRL + F4 - close window within program
* ALT + TAB - switch between open windows or programs
* TAB - move forwards through control items or links in current window
* SHIFT + TAB - move backwards through control items or links
* ENTER - click selected control item or link
* BACKSPACE - move up one folder level
* HOME - go to start of current line or web page
* END - go to end of current line or web page
* CTRL + END - go to end of current document
* PAGE UP - move up through current document or web page
* PAGE DOWN - move down through current document or web page
* PRINT SCREEN - take snapshot image of current screen
* ALT + PRINT SCREEN - take snapshot image of current window
* F2 - rename selected item
* F5 - refresh current window or web page
* F6 - move through window panes
WIMAX stands for World Interoperability for Microwave Access that enables the actual broadband wireless network with high speed. WIMAX operate same like WiFi but WiFi operate with some limitation like it is base band technology and cover only 100 feet radius with slow speed. WIMAX covers a radius of 50 Km and work with the speed of 70 Mbps. WIMAX is the replacement of the wired broadband. In wired broadband connection, we can transmit data with 512 Kbps to 10 Mbps speed and more, for example DSL broadband and cable broadband. In future all new desktop and notebook computers will be incorporated with WIMAX technology. With this technology you will be connected to the internet even you are driving your car with the speed of 120 Km.
Objective of WIMAX
Advanced IP-Based Architecture
IEEE 802.16 Specifications
Range 30 mile radius from the base station for LOS (line-of-sight).
Range 4-6 miles radius from the base station for NLOS (Non-line-of-sight)
Maximum data speed supported as 70 Mbps.
Licensed frequency band: 2- 11 GHz
Un-licensed frequency band: 10- 66 GHz
Line of sight is not needed between user and the base station unless very high date rates are required at the user premises.
Broadband Internet connection has brought joy to millions of faces. We no longer have to wait to load pages from Internet unlike dial-up connections and the phone bills are not shooting up northwards either. All is well …. Ok well, until you start noticing that PC does not download faster than say 32 kbps while the speed committed by the ISP was 256 kbps. If you are working from a home office work from your end gets affected badly and you try to resolve by restarting the system, shutting down all unused programs, etc. In fact a PC can tell the speed capacity of the DSL but not of Internet Speed. Sometimes, it should correct and pick up speed. If it did not give a solution and you encounter same problem with every website you are visiting, it calls for some serious thinking.
You should know if your ISP has committed to provide 256 kbps, he should be doing so, although, there are some factors such as peak Internet usage time where it is not the same amount of speed with any of the ISPs. So check which time of the day, the Internet speed is slow and whether during any time of the day, it touched the 256 kbps. If it didn’t and if you are getting as low speed at most of times of the day, then you may have to summon your broadband connection provider.
There are many websites that offer to test your broadband connection speed for free such as speakeasy, abeltronica, myspeed, wugnet, performance.toast.net, etc that are reasonably good and they also offer nominal fee Internet speed test at regular intervals. The results may not be 100% accurate but they sure give you an idea of your Internet speed. Search for one such website and test your Internet speed. If it points out a low speed than promised by your service provider, it is time for you to take action on your broadband service provider.
It a low cost, low power, radio technology, which is particularly suited to the short range Personal Area Network (PAN) application. Bluetooth Special Interest Group is authorized to develop its specifications & license.
The Main Features of Bluetooth are given below:
* It operates in the 2.4GHz frequency band without having a license for wireless communication.
* Up to 10-100 meters data can be transfer in real time.
* Close proximity & accuracy is not required for Bluetooth as in case of infrared data (IrDA) communication device. Bluetooth does not suffer from interference from obstacles such as walls while infrared suffers due to obstacles.
* Bluetooth supports both point-to-point and point-to-multipoint wireless connections without cables between mobile phones and personal computers.
* Data transfer rate of blue tooth varies from version to version. Data rate of 1 Mbps for Version 1.2 Up to 3 Mbps for Version 2.0.
Then major parts of Bluetooth system are RF transceiver, base band, and protocol stack. Bluetooth is used for small-area networking without user intervention. Due to extremely low transmission power in Bluetooth technique battery power is saved. It is a networking standard that works at two levels:
· Physical level.
· Protocol level
Due to these levels mobiles have to agree on these levels when bits are sent. It decides the amount of data to be sent at a time, and how the parties in a conversation can be sure that the message received is the same as the message sent.
Bluetooth networking transmits data through low-power radio waves. It can connect up to eight devices simultaneously. With in the range of about ten meters you must think that the devices will not interfere with each other. Bluetooth solved the problem of devices interference while sending the data by using the technique of Spread-Spectrum Frequency Hopping due to which devices may transfer data at the same frequency at the same time. The question rises here is how Bluetooth send the same data using same frequency band without devices interferences? In Bluetooth technique, transmitters change frequencies 1,600 times in every second. In this way devices can make full use of a limited band of the radio spectrum.
When Bluetooth devices came into the range of each other, conversations take place automatically. This conversation automatically determines whether they have the data to share or not. In this way Bluetooth devices not only share the data but also control the data to be transferred. When the connection is established, the devices either they are part of a computer system or a network, Bluetooth systems create a personal-area network.
The technology used in Bluetooth also provides security in three ways:
· Pseudo-random frequency hopping,
Frequency hops make it difficult for anyone to eavesdrop. Authentication allows a user to limit connectivity to specified devices. Encryption uses secret keys to make data intelligible only to authorized parties.
Service-level security and device-level security work together to protect Bluetooth devices from unauthorized data transmission.
Many serious problems create only due to improper security issues. Some of them are given below:
* Blue jacking
* Blue bugging
* Car Whisperer
It is used to send a business card in the form of text message via Bluetooth to other users. It should be noted that the distance between two users is not more than 10 meters. If the user doesn't found the proper text, he should add the contact to his phone book. After saving his contact in his address book retry to send the same message. In this way the user can get business card from other user via Bluetooth. It’s all because of the known destination from where the massage is being coming.
Due to this hackers can access user’s phone. It not only access one’s mobile phone, but also use its features including placing call, messaging. Even though the user doesn't realize it’s happening.
Car whisper is a type of software due to which hackers can send and receive audio file from a Bluetooth-enabled car stereo.