Subscribe
Add to Technorati Favourites
Add to del.icio.us
Saturday, January 9, 2010
Posted by pop

How to Improve Your Leadership Skills in Life and Business
If your life's purpose is close or similar to become someone that the word Leader would fairly represent then you should be very concentrated on where you need to focus on more. If your focus is on how to get more people to follow you then you have to change your mindset. Your focus instead should be on How To grow yourself as a person and ultimately become the one that others will follow as a result of the Law of Attraction.
READ MORE.....

Posted by pop

Eye Body Language - How to Use Eye Body Language to Build Trust and Be Liked
Of all the nonverbal communication signals, eye body language is probably the most fascinating. Your eyes pretty much reveal your inner thoughts and feelings. Even more amazing is the fact that you can use eye body language to build trust and make people like you.

Posted by pop

Body and Mind in Public Speaking
Connection between the mind, body and voice is beneficial for effective public speaking. Feeling confident and strong in both voice and body will free the mind to ensure a good performance.The voice is an extremely powerful tool in establishing a favorable outcome when making presentations or delivering speeches. The effectiveness of a good, strong and clear voice is undeniable.
READ MORE....

Posted by pop

Helping You Improve Your English Vocabulary:
According to statistics, about 1,500,000,000 people in the world speak English and another 1,000,000,000 are learning it. Learning the English vocabulary can be difficult because there are always exceptions to the rules and the language is punctuated with many abbreviations and colloquialisms. However, if you do choose to study English, then there are simple exercises that you can follow to make learning easier.

Posted by pop

How to Improve the Management Teams Wins for Winning More Business :
Management can create more wins by focusing on developing the people skills necessary to conduct business. With a click of the mouse, your satisfied client can leave to become someone else's satisfied client. Learn why this strategy can deliver more wins for your business management team.

Posted by pop


Search google:



Posted by pop



100 0898


5


100 0912


100 0958

Friday, January 8, 2010
Posted by pop

Welcome Home Quizzers:

Quiz Blog - Your own Quiz Blog Catalogue


Join us in our efforts to unify the quiz blogging fraternity across the country.
Find India's best quiz blogs neatly catalogued in this site.

Preparing for a Quiz Show?

Wanna know about various Quiz Shows in your city?

QuizBlog Portal is a One Stop Quizzing Portal for everyone
CLICK HERE TO ENTER:

Posted by pop

Common Email Hacking Methods:






Gone are the days when email hacking was a sophisticated art. Today any body can access hacking tips through the Internet and start hacking your yahoo or hotmail account. All that is needed is doing a search on google with keywords like “how to hack yahoo”, “hack yahoo messenger”, “hotmail hack program” etc. The following article is not an effort to teach you email hacking, but it has more to do with raising awareness on some common email hacking methods.
Hackers can install keylogger programs in the victim’s computer. This program can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden. After installation, the hacker will use a password and hot keys to enable the keylogger. He can then use the hot keys and password to access your key entry details.
A keylogger program is widely available on the internet.some of them are listed below
Win-Spy Monitor


Realtime Spy


SpyAgent Stealth


Spy Anywhere
For more information on keyloggers and it’s usage refer my post Hacking an email account.
Even if direct access to your computer is not possible, hackers can still install a key logger from a remote place and access your computer using Remote Administration Tools (RATs).
Another way of getting your password is the use of fake login pages that look exactly like the real one. So, beware of the webpages you visit. Also if you find your computer behaving oddly, there is a chance that some spy program is running. On such occasions it is better to try and remove the malware or reformat the entire hard disk.A detailed Email Hacking tutorial is discussed in the post Hacking an email account

Posted by pop

How to Make Invisible Password Protected Folder:


Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.


How to create a Password Protected Folder


Step-1: Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as ABC.

Step-2: Now in this folder place all the important files, documents or any folders that you want to password protect.


Step-3: Now Right-click on this folder (ABC) and select the option Send To -> Compressed (zipped) Folder.

Step-4: Now a new compressed zipped folder gets created next this folder (ABC) with the same name.

Step-5: Double-click on this compressed zipped folder and you should see your original folder (ABC) here.


Step-6: Now goto the File menu and select the option Add a password.


ie: File -> Add a password


Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the password protected folder.


How to make it Invisible


Step-1: Now Right-click on this password protected folder and select Properties.


Step-2: At the bottom select the option Hidden and press OK. Now your folder gets invisible (hidden).


Step-3: In order to unhide this folder go to My Computer – >Tools -> Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options

Do not show hidden files and folders
Show hidden files and folders
Now select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password. To make it invisible again repeat step -1 through step-3 and select the first option and click OK. Now the folder becomes invisible once again.

I hope you like this post. Pass your comments!! Cheers

Posted by pop

Hack Software and Run the Trial Program Forever:


In this post I’ll show you how to hack a Software and run the trial program forever.Most of us are familiar with many softwares that run only for a specified period of time in the trial mode.Once the trial period is expired these softwares stop functioning and demand for a purchase.But there is a way to run the softwares and make them function beyond the trial period.Isn’t this interesting?


Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares.I’ll try to explain this in brief.


When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc.After installation every time you run the software, it compares the current system date and time with the installed date and time.So, with this it can make out whether the trial period is expired or not.
So with this being the case, just manually changing the system date to an earlier date will not solve the problem.For this purpose there is a small Tool known as RunAsDate.


RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.


RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify.It works with Windows 2000, XP, 2003 and Vista.


NOTE: FOLLOW THESE TIPS CAREFULLY


You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.


1. Note down the date and time, when you install the software for the first time.


2. Once the trial period expires, you must always run the software using RunAsDate.


3. After the trial period is expired, do not run the software(program) directly.If you run the software directly even once, this hack may no longer work.


4. It is better and safe to inject the date of the last day in the trial period.
For example, if the trial period expires on jan 30 2009, always inject the date as jan 29 2009 in the RunAsDate.
I hope this helps!

Please express your experience and opinions through comments.

Posted by pop

A Virus Program to Disable USB Ports:


In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.


Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.

1. Download the USB_Block.rar file on to your computer.
2. It contains the following 4 files.
block_usb.c (source code)
unblock_usb.c (source code)


3. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my post - How to Compile C Programs.


3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).

4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.
5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post – How to Change the ICON of an EXE file (This step is also optional).




I hope you like this post. Please pass your comments

Posted by pop

Tata Docomo Launches Samsung Galaxy in India :


Tata DOCOMO, the GSM brand of Tata Teleservices Limited and Samsung Mobile announced the launch of the first Android-powered Samsung mobile phone with in-built Google Mobile Services in India. Enter the Samsung Galaxy (I7500). his powerful device...
Read more.....

Posted by pop

Samsung to Launch Corby Mate S3650 and B3310 in India, Price, Review, Specification :


Samsung Electronics Co. Ltd, a leading mobile phone provider, today announced the availability of Samsung Corby (model: S3650), a mobile phone designed to support the digitally connected lifestyles of today’s young mobile users. The Samsung Corby,...
Read more.....

Posted by pop

Reliance CDMA Handset Coolpad 2938 Price, Phone Review, Technical Specifications :


Hong-Kong stock exchange-listed China Wireless Technologies Indian subsidiary Coolpad Communications has an exclusive distribution agreement with Reliance Communications' retail subsidiary, Reliance Webstore.Its handsets are available in the market...
Read more....

Posted by pop

Nokia 2690 Price in India, Nokia 2690 Mobile Review, Price, Specification :



Nokia 2690 is a candybar that looks pretty nice and has most of the features the 2220 has, plus EDGE and MicroSD card support (up to 8GB). It features FM radio,MP3 player and the standard 3.5mm headphone jack.It supports up to 2GB of memory through...
Read more...

Posted by pop

MOBILE PHONE REVIEWS:


Samsung launches Corby Plus and Corby Pro in India :


Samsung has launched two new Corby variants, Corby Plus B3410 and Corby Pro B5310 in Indian markets. This is in context with the rise in popularity of the recently released Corby handsets. Samsung Corby Plus is known basically as the Corby B3410...
Read more....

Posted by pop

DIPLOMA RESULTS:
CLICK 1
CLICK2

Posted by pop

THEERATHA VILAYATTU PILLAI:


Banner – GK Film Corporation
Star Cast – Vishal Krishna, Tanushree Dutta, Prakash Raj, Neetu Chandra, Sarah Jane Dias, Santhanam, Mouli, Urvashi, Sathyan, Mayilsami and Others…
Producer – Vikram Krishna
Directior – Thiru
Music Composer – Yuvan Shankar Raja
Lyrics – Pa. Vijay, Vaali
Label – Sony Music 

DOWNLOAD: 

Posted by pop

PAIYAA :


Banner – Thirrupathi Brothers Film Media (P) Ltd
Star Cast – Karthi, Thamana, Milind Soman, Jagan, Soniya Deepthi and Others…
Producer – N.Subash Chandra Bose
Director – Lingusamy
Music Composer – Yuvan Shankar Raja
Lyrics – Na. Muthukumar
Label – Think Music
Year of Release – 2010

Posted by pop

                           E-BOOKS AND TUTORIALS: 
C++ 
CAT 


VIDEOS FREE DOWNLOAD:

Posted by pop

                                       VIDEOS FREE DOWNLOAD:

1.RAW VIDEOS FREE DOWNLOAD
2.WANTED 2009(HINDI) 
3.PAA 2009 
4.KURBAAN 2009 
5.LONDON DREAMS 
6.DE DANA DAN 
7.BLUE 
8.KAMINEY 
9.STRANGE DAYS 
10.ALL THE BEST 

 

GOA MP3:

Posted by pop


Banner – Ocher Studios
Star Cast – Premji Amaren, Jai, Vaibhav, Arvind Aakash, Sneha and Others…
Producer – Soundarya Rajinikanth
Director – Venkat Prabhu
Music Composer – Yuvan Shankar Raja
Lyrics – Vaali
Label – Sony Music
Year of Release – 2010

KACHERI AARAMBAM MP3:

Posted by pop


Banner – Super Good Films
Star Cast – Jeeva, Poonam Bajwa, Vadivelu, Alagam Perumal, Kadhal Thandapani, Crane Manohar, Muthukalai, Sriranjini, Chakravarthy, King Kong and Others…
Director – Thiraivannan
Producer – R.B.Choudary
Music Composer – D.Imman
Lyrics – Na.Muthukumar, Thiraivannan, Vivega, D.Imman
Label – Star Music
Year of Release – 2010






KUTTY MP3 FREE DOWNLOAD:

Posted by pop


Banner – Gemini Film Circuit
Star Cast – Dhanush, Shriya Saran, Meghna Naidu, Sameer Dattani and Others
Director – Mitran.R.Jawahar

Music Composer – Devi Sri Prasad
Lyrics – Vivega, Selvaraghavan, Thamarai
Label – Think Music
Year of Release – 2009

DOWNLOAD: 

Thursday, January 7, 2010

TAKE FREE QUIZ-SHOW THE POWER OF UR GREY CELLS

Posted by pop
Wednesday, January 6, 2010

WORKING OF GSM:

Posted by pop

GSM (Global System for Mobile communications: originally from Groupe Spécial Mobile) is the most popular standard for mobile phones in the world. Its promoter, the GSM Association, estimates that 80% of the global mobile market uses the standard.[1] GSM is used by over 3 billion people across more than 212 countries and territories.[2][3] Its ubiquity makes international roaming very common between mobile phone operators, enabling subscribers to use their phones in many parts of the world. GSM differs from its predecessors in that both signaling and speech channels are digital, and thus is considered a second generation (2G) mobile phone system. This has also meant that data communication was easy to build into the system. GSM EDGE is a 3G version of the protocol.




The ubiquity of the GSM standard has been an advantage to both consumers (who benefit from the ability to roam and switch carriers without switching phones) and also to network operators (who can choose equipment from any of the many vendors implementing GSM[4]). GSM also pioneered a low-cost (to the network carrier) alternative to voice calls, the short message service (SMS, also called "text messaging"), which is now supported on other mobile standards as well. Another advantage is that the standard includes one worldwide emergency telephone number, 112.[5] This makes it easier for international travellers to connect to emergency services without knowing the local emergency number.

Newer versions of the standard were backward-compatible with the original GSM phones. For example, Release '97 of the standard added packet data capabilities, by means of General Packet Radio Service (GPRS). Release '99 introduced higher speed data transmission using Enhanced Data Rates for GSM Evolution (EDGE).
READ MORE....

WORKING OF GPRS:

Posted by pop



General packet radio service (GPRS) is a packet oriented mobile data service available to users of the 2G cellular communication systems global system for mobile communications (GSM), as well as in the 3G systems. In 2G systems, GPRS provides data rates of 56-114 kbit/s [1]

GPRS data transfer is typically charged per megabyte of traffic transferred, while data communication via traditional circuit switching is billed per minute of connection time, independent of whether the user actually is using the capacity or is in an idle state. GPRS is a best-effort packet switched service, as opposed to circuit switching, where a certain quality of service (QoS) is guaranteed during the connection for non-mobile users.

2G cellular systems combined with GPRS are often described as 2.5G, that is, a technology between the second (2G) and third (3G) generations of mobile telephony[2]. It provides moderate speed data transfer, by using unused time division multiple access (TDMA) channels in, for example, the GSM system. Originally there was some thought to extend GPRS to cover other standards, but instead those networks are being converted to use the GSM standard, so that GSM is the only kind of network where GPRS is in use. GPRS is integrated into GSM Release 97 and newer releases. It was originally standardized by European Telecommunications Standards Institute (ETSI), but now by the 3rd Generation Partnership Project (3GPP)[3][4].
GPRS was developed as a GSM response to the earlier CDPD and i-mode packet switched cellular technologies
READ MORE...



Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode. Wi-Fi Network connect computers to each other, to the internet and to the wired network. The wifi Network works like the basic concept of the Walkie talkies.A Wi-Fi hotspot is created by installing an access point to an internet connection.An access point acts as a base station. When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly.A single access point can support up to 30 users and can function within a range of 100 – 150 feet indoors and up to 300 feet outdoors.Many access points can be connected to each other via Ethernet cables to create a single large network.
Operational advantages

Wi-Fi allows local area networks (LANs) to be deployed without wires for client devices, typically reducing the costs of network deployment and expansion. Spaces where cables cannot be run, such as outdoor areas and historical buildings, can host wireless LANs.

Wireless network adapters are now built into most laptops. The price of chipsets for Wi-Fi continues to drop, making it an economical networking option included in even more devices. Wi-Fi has become widespread in corporate infrastructures.

Different competitive brands of access points and client network interfaces are inter-operable at a basic level of service. Products designated as "Wi-Fi Certified" by the Wi-Fi Alliance are backwards compatible. Wi-Fi is a global set of standards. Unlike mobile phones, any standard Wi-Fi device will work anywhere in the world.

Wi-Fi is widely available in more than 220,000 public hotspots and tens of millions of homes and corporate and university campuses worldwide.[35] The current version of Wi-Fi Protected Access encryption (WPA2) is considered secure, provided a strong passphrase is used. New protocols for Quality of Service (WMM) make Wi-Fi more suitable for latency-sensitive applications (such as voice and video), and power saving mechanisms (WMM Power Save) improve battery operation.
READ MORE...

MY NAME IS KHAN:

Posted by pop

My Name Is Khan Shahrukh Khan's New Movie trailer, Check out Shahrukh khan's My name is khan first theatrical trailer which was released today worldwide.
Shahrukh Khan  and Kajol starred movie is going to be screened in Berlin in International Film Festival will be held from Feb 11 to 21, 2010. Much hyped movie is finally ready to showcase in International film festival

Produced under Shahrukh Khan owned production house Red Chillies Entertainment and Dharma Productions, Karan Johar directed movie will be distributed by Fox STAR Studios in India and by Fox Searchlight worldwide.


WATCH AND DOWNLOAD:

Posted by pop

Aayirathil Oruvan is a forthcoming 2010 adventure Tamil–language film directed by Selvaraghavan, who with the project, directs his fifth film. The film, which has music composed by G. V. Prakash Kumar and photography directed by Ramji, will release on January 14, 2010 coinciding with the festival of Thai Pongal.
Cast

  • Karthi Sivakumar
  • Reema Sen
  • Andrea Jeremiah
  • R. Parthiban
  • Pratap Pothan
  • Azhagam Perumal
TRAILER:
DOWNLOAD:

MOVIE NAME:VINNAI THAANDI VARUVAAYA[2010]
Movie Name: Vinnai Thandi Varuvaya
Directed by: Gautham Menon
Produced by: Madan, Ganesh, Elred, Jayaraman
Starring: Silambarasan, Trisha Krishnan, Uma padmanaban
Music : A. R. Rahman


DOWNLOAD:

1. Anni Kagalane
2. Endellostuga
3. Hello





http://groups.yahoo.com/group/babes_in_blue/


Company founder Marc Ewing was given the Cornell lacrosse team cap (with red and white stripes) while at college by his grandfather. He lost it and had to search for it desperately. The manual of the beta version of Red Hat Linux had an appeal to readers to return his Red Hat if found by anyone!




The name started as a jockey boast about the amount of information the search-engine would be able to search. It was originally named 'Googol', a word for the number represented by 1 followed by 100 zeros. After founders - Stanford graduate students Sergey Brin and Larry Page presented their project to an angel investor, they received a cheque made out to 'Google

APPLE:Favourite fruit of founder Steve Jobs. He was three months late in filing a name for the business, and he threatened to call his company Apple Computers if the other colleagues didn't suggest a better name by 5 o'clock.

LINUX:
It got its name because its founders got started by applying patches to code written for NCSA's httpd daemon. The result was 'A PAtCHy' server - thus, the name Apache.

ADOBE:
The name came from the river Adobe Creek that ran behind the house of founder John Warnock .






Ferrari S.p.A. is an Italian sports car manufacturer based in Maranello, Italy. Founded by Enzo Ferrari in 1929 as Scuderia Ferrari, the company sponsored drivers and manufactured race cars before moving into production of street-legal vehicles in 1947 as Ferrari S.p.A.. Throughout its history, the company has been noted for its continued participation in racing, especially in Formula One, where it has enjoyed great success.


THE  4 MAIN UNITS OF FERRARI FACTORY ARE:

1 FOUNDRY

 


 


 


 


 

                              


2 BODY BUILDING UNIT






 





3.ASSEMBLY UNIT





 


 








4.INTERIORS




 


 





 MOVIE: Name:ASAL [ASAL-2010]
Starring: Thala Ajith Kumar, Prabhu, Sameera Reddy, Bhavana,
Suhasini, Surendra Pal, Suresh, Rajiv Krishna, Sampath Raj, Pradeep Rawat, Yugi Sethu
Direction: Saran
Music Director: Bharathwaj & Y- Kinz
Production: Ramkumar Ganesan, Prabhu Ganesan
Editor: Anthony Gonsalves
Lyrics: Viramuthu



  • Molecular biologists are beginning to unravel the information processing tools-such as enzymes, copying tools, and so on-that evolution has spent billions of years refining. Now we are taking those tools in large numbers of DNA molecules and using them as biological computer processors.
·         A single gram of dried DNA, about the size of a half-inch sugar cube, can hold as much information as a trillion compact discs.
·         Each nucleotide-A, C, T, or G – can be considered a letter in a four-letter alphabet that is used to write our biological messages in a linear “ticker-tape” form.
·         Organisms differ because their respective DNA molecules carry different nucleotide sequences and therefore different biological message.
·         Since the number of possible sequences in a DNA molecule, which is n nucleotides long, is 4ⁿ, the biological variety that could in principle be generated using even a modest length of DNA is enormous.
·          A typical animal cell contains a meter of DNA (3*10 Nucleotides). Written in a linear alphabet of four letters, an unusually small human gene would occupy a quarter of a page of text, while the genetic information carried in a human cell would fill a book of more than 500,000 pages.