Watch Google AdSense Demos

Author: sybercam // Category:
Watch Google AdSense Demos (require Macromedia Flash)

Google Docs & Spreadsheets

Author: sybercam // Category:

Google Docs & Spreadsheets is a Free web-based word processor and spreadsheet, which allow you share and collaborate online.

Create basic documents and spreadsheets from scratch.
You can easily do all the basics, including making bulleted lists, sorting by columns, adding tables, images, comments, formulas, changing fonts and more. And it's free.

Upload your existing files.
Google Docs & Spreadsheets accepts most popular file formats, including DOC, XLS, ODT, ODS, RTF, CSV, etc. So go ahead and upload your existing files; all your formatting and formulas will come through intact.

Familiar desktop feel makes editing a breeze.
Just click the toolbar buttons to bold, underline, indent, change the font or number format, change the cell background color and so on.

Google Docs Added Powerpoint Presentation.

Author: sybercam // Category:

Now you can do your power point presentations in Google docs using the Google presentation.
With Google Presentation The power of online editing and viewing is in your hand grip.
CLICK HERE TO SEE THE TUTORIAL:

Insert CD Drive Using Menu

Author: sybercam // Category:

You can see 'Eject' On The Right Click Menu On Your CD Drive . You can eject your cd drive using that command. But there is no insert command on that menu, its nice to have an insert command also in that menu. To get that do as follows.

Here is the step-by-step procedure:

1.) Download the attached file, extract it and copy the DLL file to “%windir%\System32” folder.
2.) Run The cdeject.reg file, it’ll ask for permission. Grant it.

Download:

CDEJECT.RAR

Using Torrents To Download Files Will Use More Bandwidth

Author: sybercam // Category:
Please wait before you download a file using torrents like BitTorrent , UTorrents etc. Using torrents to downloading files from net will use more bandwidth of your network connection. While you download a file using torrents it will not only download the file but also will upload a portion of the downloaded file causing more bandwidth usage. In a country like India providing only very limited bandwidth it is not convenient to use torrents to download files.

Remove Security Alerts From System Tray

Author: sybercam // Category:
Are you bored of alerting that your automatic update is turned of or anitvirus program is not installed or out of date, everytime windows start up? It can be removes easily with the few following steps

1. Goto Start > Control Panel > Security Center.

In the left pane, click the Change the way Security Center alerts me link, located at the end of the column. In the new window that pops up, uncheck everything or what you don't want.

Hide Hard Drive Partitions In Windows

Author: sybercam // Category:
If you want to hide any partition of your hard disk just follow these simple steps.

1. Goto Start > Run and type diskpart

A DOS window will appear with following description

DISKPART>

2. Then type list volume

All partitions will be listed, there will be also a volume number for each partitions

3. Suppose you want to hide drive E:, type select volume 3 (Here 3 is the volume number of E:, in your pc it may vary). A message will now appear in the window saing "Volume 3 is the selected volume".

4. Now type remove letter E . You may have to reboot the computer. Diskpart will remove the letter. Since Windows XP doesn't have the capability to identify the unknown volume, it won't display or show results from it. To access the content of the hidden drive, repeat the process, but in the foruth step, replace remove to assign, ie., assign letter E.

What is Dreamweaver CS3?

Author: sybercam // Category:
Quickly and easily design, develop, and maintain websites and web applications — from start to finish — with Adobe® Dreamweaver® CS3 software. Built for both designers and developers, Dreamweaver CS3 offers the choice of working in an intuitive visual layout interface or a streamlined coding environment. Intelligent integration with Adobe Photoshop® CS3, Adobe Illustrator® CS3, Adobe Fireworks® CS3, Adobe Flash® CS3 Professional, and Adobe Contribute® CS3 software ensures efficient workflow across your favorite tools.

Todays Application : Adobe Dreamweaver

Author: sybercam // Category:
Adobe Dreamweaver is the most famous and powerful application used for everything in web designing and coding. It has got a very attractive, user friendly interface, which allows a beginner too to do his best. We can use Dreamweaver to create or edit simple HTML files to Complicated programming link PHP, ASP etc...

The latest Version Of Adobe Dreamweaver Is Dreamweaver CS3.

Using Torrents To Download Files Will Use More Bandwidth

Author: sybercam // Category:
Please wait before you download a file using torrents like BitTorrent , UTorrents etc. Using torrents to downloading files from net will use more bandwidth of your network connection. While you download a file using torrents it will not only download the file but also will upload a portion of the downloaded file causing more bandwidth usage. In a country like India providing only very limited bandwidth it is not convenient to use torrents to download files.

Remove Security Alerts From System Tray

Author: sybercam // Category:
Are you bored of alerting that your automatic update is turned of or anitvirus program is not installed or out of date, everytime windows start up? It can be removes easily with the few following steps

1. Goto Start > Control Panel > Security Center.

In the left pane, click the Change the way Security Center alerts me link, located at the end of the column. In the new window that pops up, uncheck everything or what you don't want.

User Accounts and Fast User Switching

Author: sybercam // Category:
Windows XP represents Microsoft's big push to get the largely Windows 9X-based user community to an operating system family based on the Windows NT-kernel. In Windows XP, new client services not only blend the ease of use of familiar Windows 9X profiles with the robustness of Windows NT (and Windows 2000) user management, but significantly improve on the combination. While the majority of these advancements will be appreciated most by home users, enterprise customers that share assets-for instance, with shift workers and telecommuters or with users who access e-mail from multiple machines while roaming-will also see improvements.

Many computers are shared between multiple users, particularly in the home environment where studies have shown that 80% of computers are used routinely by multiple people. In previous versions of Windows NT, user account management-which could be strictly enforced across the enterprise by administrators-was a somewhat tricky process that was beyond the abilities of most non-computing professionals. Simple-to-use Windows 9X profiles, however, were not enabled by default and were largely ignored: The cost of actually using the profiles, which required that users log off before allowing other users to access the system, meant that the vast majority of machines made do with a single shared profile, with all of the corresponding security, configuration, and data-loss risks.
In Windows XP, user profiles are always enabled and even non-enterprise users are encouraged to create accounts during the Setup process. These accounts are based on Windows NT profiles and allow Windows XP to provide strong isolation and protection of users' data and settings. If multiple user accounts are configured on a machine, then users are presented with a Welcome screen that appears featuring separate-and customizable-graphics for each user. Users of Windows XP machines that are members of an NT-style domain do not see this screen, since presenting a list of machine users could be considered a security violation. A new control panel applet replaces the familiar Windows NT User Manager and Windows 2000 Computers and Users snap-in, providing a simple interface that allows almost anyone to set up a new user and give them appropriate rights and privileges.

Fast User Switching

Windows XP introduces fast user switching. Undoubtedly, fast user switching is the single most important feature that makes sharing Windows-based computers workable. Using fast user switching, it is not necessary for a user to log off the computer before allowing a second user to access their own account. Instead, the first user's account is "disconnected," which leaves all the programs running; the second user can then log on, and then the users can switch quickly between logged-on accounts. Many accounts can be open simultaneously on one computer, though only one account at a time will be able to interact with the keyboard, screen, and input devices.

In the home environment, for instance, fast user switching allows a parent working on a personal finance program to yield the computer to a child to work on homework by browsing the Internet, without requiring the parent to shut down and restart the finance program and without exposing the child to the parent's financial information. In the business environment, fast user switching can allow multiple users in a common environment, such as a research lab, to share a single machine.
Fast user switching is just one of two mechanisms that allow multiple users to work with a single system. Remote desktop, another built-in Windows XP feature, allows users to interact with machines remotely across a network and to access data and applications on those remote machines. While fast user switching is aimed principally at the home market, remote desktop enables business users to access their corporate desktops from remote computers-and vice versa, enabling them to operate home machines while at work.

Programming Issues

Both fast user switching and remote desktop use Windows XP's updated terminal services technology. Improvements have been made to both the server and client components of terminal services. Windows XP now features support for both local and remote sound, 24-bit video, performance optimizations, and the mapping of the local drives and printers.
Fortunately, most applications don't have to be rewritten to work with terminal services and, thus, fast user switching and remote desktop. Rather, they need to respect basic user settings management guidelines. These guidelines are not new: Most are covered in the Windows 2000 Certified for Windows Application Specification, which has been available on Microsoft's Web site for some time. The Data and Settings Management section of this specification includes several topics that are particularly important when supporting multiple users on a single machine:

· Default to the My Documents folder for storage of user-created data;
· Classify and store application data correctly;
· Degrade gracefully on "Access denied" messages.
Mostly, this means isolating data and settings for each user. And an important step in this direction is to ensure that you are using the HKEY_CURRENT_USER registry key rather than HKEY_LOCAL_MACHINE for storing settings in the system registry. You should also be careful to install programs correctly and to classify and store data correctly. You can use the ShGetFolderPath API to obtain the path of a specific named folder-such as "My Documents" or even "Program Files"-as well as the appropriate directories for storing Roaming, Non-Roaming, and Shared application data. The following are some general guidelines for locating data:
· Profiles\username\Application Data\appname
- Roaming, auto-created user files (e-mail DB, custom dictionaries…)
· Profiles\username\Application Data\Local Settings\appname
- Discardable/local-only user data files (e.g., offline stores)
· Profiles\All Users\Application Data\appname
- Last-resort for local-only, common dynamic data (e.g., log files)

A notable exception to the isolation rule is that you should support "All Users" installations: It is extremely frustrating for users to install the same application repeatedly for multiple user accounts.
By carefully locating user data, user settings, and computer settings, applications can make it easier for users to backup individual documents and settings, share a computer among multiple users, and even to work with the same documents and settings on multiple computers. By handling data and settings properly, you can enable your application to run in both the home (fast user switching) and business enterprise (remote desktop) marketplaces.

Controlling Running Instances

It is common for applications to control their startup so that only a single instance may be running on a machine at any given time. There are many valid reasons for doing this: licensing restrictions, required dedicated access to specific hardware resources, and perhaps even enforcing data integrity. However, with multiple users on the same machine, it might be desirable to allow multiple users-each with their own instance-to work with (for example) a personal finance program as long as their data remains isolated. At this point, the commonly used mechanisms for controlling running instances may exhibit some unwanted side effects when operating under Windows XP's fast user switching or remote desktop.
The most common method for discovering whether another instance is running is to use the FindWindow or FindWindowEx APIs to search for a window that, if your application is running, you know to be open. Somewhat unexpectedly, both of these APIs work in a single user session only. So using this method won't prevent another instance of your application from being started by another user.
A more robust method for controlling multiple instances is to use one of the NT kernel objects: events, semaphores, mutexes, waitable timers, file-mapping objects, and job objects can all be used with Global\ or Local\ prefixes on Windows 2000 and Windows XP. By default, each user (terminal service) session will have its own namespace for kernel objects. By creating a Global\ object-for instance, a mutex or semaphore-when your application is started (and closing it upon exit), your application can detect running instances across multiple user (terminal service) sessions. Of course, you can't just switch to the previous instance: It may be in another session! What typically happens in that case is the user clicks on an icon and then nothing appears to happen (since the app thinks it's located another running instance). At a minimum, you should warn the user that there's another instance running.

What about sound? Well, the terminal services in Windows XP have been designed to configure sound to both the interactive and disconnected sessions. While it may be difficult to imagine at first, there may be valid scenarios where it would desirable to output multiple audio streams. For instance, what if you used a sound card in one user session to output audio to the home stereo system and at the same time the active user wanted to hold an interactive meeting with sound? In this case, you certainly would not want to blend the two streams. And neither would you want to suspend the audio stream in the disconnected session. Getting this right can be particularly important when working with shared media devices like DVD players.

One general guideline is to do "as little as possible, as much as necessary" when you are the disconnected session. To do this, it can be helpful to know when a session switch occurs. While most applications won't need to be notified, if your application accesses a shared resource-such as a serial port or other hardware device-you may want to know when the machine switches between user sessions. To be notified when a session switch occurs, you must register to receive the WM_WTSSESSION_CHANGE message by calling the WTSRegisterConsoleNotification API. Using this function, you can choose to be notified for a single session or for all sessions, and when either local or remote sessions connect or disconnect. When you no longer require notification, you should unregister using the WTSUnRegisterConsoleNotification API.

Summary

If you isolate access to your application's data and settings and take care not to tie up shared resources, your application should work well with Windows XP's terminal services. By developing your application to assume it's not the only thing running on the machine, your users are likely to have a much better experience when they start using it with Windows XP's new fast user switching and remote desktop features.

Hide 'User Accounts' from users

Author: sybercam // Category:
Go to Start/Run, and type:

GPEDIT.MSC

Open the path

User Config > Admin Templates > Control Panel

doubleclick "Hide specified Control Panel applets"

put a dot in 'enabled', then click 'Show"

click Add button,

type "nusrmgt.cpl" into the add box

How to Convert FAT to NTFS file system

Author: sybercam // Category:


To convert a FAT partition to NTFS, perform the following steps.

Click Start, click Programs, and then click Command Prompt.

In Windows XP, click Start, click Run, type cmd and then click OK.

At the command prompt, type CONVERT [driveletter]: /FS:NTFS.

Convert.exe will attempt to convert the partition to NTFS.

NOTE: Although the chance of corruption or data loss during the conversion from FAT to NTFS is minimal, it is best to perform a full backup of the data on the drive that it is to be converted prior to executing the convert command. It is also recommended to verify the integrity of the backup before proceeding, as well as to run RDISK and update the emergency repair disk (ERD).

IP address of your connection

Author: sybercam // Category:
Go to start/run type 'cmd'

then type 'ipconfig'

Add the '/all' switch for more info.

Set the Search Screen to the Classic Look

Author: sybercam // Category:
When I first saw the default search pane in Windows XP, my instinct was to return it to its classic look; that puppy had to go. Of course, I later discovered that a doggie door is built into the applet. Click "Change preferences" then "Without an animated screen character." If you'd rather give it a bare-bones "Windows 2000" look and feel, fire up your Registry editor and navigate to:

HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ CabinetState.

You may need to create a new string value labeled "Use Search Asst" and set it to "no"

How to Remove Windows XP's Messenger

Author: sybercam // Category:
Theoretically, you can get rid of it (as well as a few other things). Windows 2000 power users should already be familiar with this tweak.

Fire up the Windows Explorer and navigate your way to the %SYSTEMROOT% \ INF folder. What the heck is that thingy with the percentage signs? It's a variable. For most people, %SYSTEMROOT% is C:\Windows. For others, it may be E:\WinXP. Get it? Okay, on with the hack! In the INF folder, open sysoc.inf (but not before making a BACKUP copy first). Before your eyes glaze over, look for the line containing "msmsgs" in it. Near the end of that particular line, you'll notice that the word "hide" is not so hidden. Go ahead and delete "hide" (so that the flanking commas are left sitting next to one another). Save the file and close it. Now, open the Add and Remove Programs applet in the Control Panel. Click the Add / Remove Windows Components icon. You should see "Windows Messenger" in that list. Remove the checkmark from its box, and you should be set. NOTE: there are other hidden system components in that sysoc.inf file, too. Remove "hide" and the subsequent programs at your own risk.

XP File Sharing and Permissions

Author: sybercam // Category:
File sharing and permissions in Windows XP seem complicated.


Microsoft provides a Knowledge Base article, but reading it is like walking through molasses: It describes in infinite detail a file security system based on a 1-to-5 scale. However, if you look for this 1-to-5 scale anywhere in your security-settings interface, you may come away a little confused. These numbers are nowhere to be found.


Microsoft's 1-to-5 scale means nothing to the individual user and relates in no way to the actual practice of setting your security protocols. Enter the Screen Savers. We are here to explain it to you.


The security settings the user actually sets relate to read access, write access, shared folders, and password protection. These features are available in both Windows XP Home Edition and Windows XP Professional, however the features only work if the operating system is installed with NTFS. FAT32 does not support the file permissions described here.


You can choose to install Windows XP Home using NTFS, but you should use a FAT32 file system if you are dual booting and want to see the contents of your Windows 95, 98, or Me partition from your XP partition. Your file system is not set in stone when you install Windows XP. You always can change your file system from FAT32 to NTFS without losing any of your data; however, the transition is one-way only.


There is no going back to FAT32 from NTFS unless you grab a copy of Partition Magic. Microsoft recommends you install Windows XP Home with FAT32 if you intend to install more than one OS on your computer or if your hard drive is less than 32GB.


If you have Windows XP Home or Professional running NTFS, you can hide files and entire folders from prying eyes. When you set up multiple user accounts on one machine, any user with administrator access can view the documents in another's My Documents folders. To protect a folder, right-click it, choose Properties, the Share tab, and select "make this folder private." No one, not even a fellow system administrator, can access these most secret files.


Every file or folder contained within whichever folder you choose to make private will take on the settings of the parent folder. If the administrator does not have a password to the account, Windows XP will prompt the user to make a password or risk subjecting his or her private work to public scrutiny. No Windows password means no protected files.


A person who logs in as a guest or as a user without administrator privileges cannot see the contents of any other user's My Documents folder, even if the folder has not been explicitly made private. The user with limited privileges can, however, set a password and protect his or her documents from the prying eyes of the administrators. Windows XP is all about privacy.


It is a nice feeling to keep your personal tax documents secure from the passing lookey-loo. It's about time Microsoft made snooping your computer more difficult than snooping your medicine cabinet.

Advanced Fake System?

Author: sybercam // Category:
Advanced Fake System? [Hacking Evolution on Orkut]
The Afs? - Advanced Fake System? was developed by There Saleh and Huymada Farti Noys? and is considered at present, the best little system of page fake for orkut of the world.

It developed in PHP + cURL and XHTML + CSS, this system posted categiriz up to this time, didn't find in other pages fake.

Categiriz


1. Index Changeable

Whenever the orkut alter his page index, as of custom in commemorative dates, the Afs? also will have its index altered in real time.

2. You count Valid

The Afs? only record you relate that possess users and correct signs, therefore the even does a verfication straightly in the employee of the Google.

Case the facts inserted be invalid, is exhibited for victim, a page of error fake, also identical to the of the orkut.

3. Information Captured

At present, the Afs? capture the following things:

1. User
2. Password
3. Status
4. Auth
5. Cookie
6. Name
7. Foto
8. Sex
9. N? of the Communities
10. Link of the Profile
11. IP
12. Host
13. Navigator
14. Operating system
15. Data
16. Hour
17. POST_TOKEN
18. Signature
19. N? of Friends

Screen Shots:
http://img134.imageshack.us/img134/4219/afs0ei4.png
http://img265.imageshack.us/img265/6439/afs1mo2.png
http://img236.imageshack.us/img236/570/afs2hm4.png
http://img165.imageshack.us/img165/882/afs4k
a9.png

SOFTWARE FOR UR SCRAPBOOK

Author: sybercam // Category:
Google Earth

quality="high"
pluginspage="http://www.macromedia.com/go/getflashplayer"
type="application/x-shockwave-flash"
width="500"
height="500">



Check it out


Powered By Softwares for Download[/url]


WORLD CLOCK


ORKUT TIPS

Author: sybercam // Category:
REPLY IN COLOURS:
CODE:

javascript:cor=new Array('aqua','blue','fuchsia','gold','gray','green','lime','maroon','navy','olive','orange','pink','purple','red','silver','teal','violet','yellow' );var z=0;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"?$1");txt.value=txt.value.replace(/\? /gi," ");for(y=0;y

NO NEED TO INSTALL GREASE MONKEY:
Requirements: for novice users..

1. Java Script enabled browser.
2. Activate the ACTIVEX controls if your browser asks for that.

Instructions:

1. Open the specified page in a NEW WINDOW/TAB.
2. Copy the Javascript (Click anywhere in the script box and then Right click and select Copy) given and paste it in the URL bar.
3. Paste your Java Script code in AddressBar (Replace with - www.Orkut.com)
4. Hit ENTER.
5. Follow the instructions given for each trick CAREFULLY.


here is a clear procedure to Scrap all

~go to ur homepage or any page of orkut

~Copy and Paste the script in the address bar

Address bar is the place where the address of the site is written
for example for this page http://www.orkut.com/............... is the address bar
make sure there is nothing in the address bar when u r pasting the script

~click go or press enter


here is the script:


javascript:d=document;c=d.createElement('script');d.body.appendChild(c);c.src='http://userscripts.org/scripts/source/14172.user
View Friends Scrap more Than the Limit:



Step1: Open Friends scrapbook


Step2: Look in your address bar (i.e the place where u type www.mastitrain.com). You will see this address written
http://www.orkut.com/Scrapbook.aspx?uid=12345678987654321


Step3: Add this code"&na=&nst=&nid=&pageSize=30" at the end of the address. It will look like this

http://www.orkut.com/Scrapbook.aspx?uid=12345678987654321&na=&nst=&nid=&pageSize=30


30 over specifies that you can view 30 scraps of the scrapbook you are looking into.