Wednesday, October 5, 2011

File Formats And Extensions





000-999 used to number old (backup) versions of files (for example, CONFIG.SYS when changed by an installation program); also used to number related data files for multiple users of a small-scale PC application

12M Lotus 123 97 Smart master file

123 Lotus 123 97 file

2GR and 3GR VGA Graphics driver/configuration files under Windows

386 A file for use in an 80386 or higher microprocessor

669 Composer 669, Unis Composer music mod file

#01 and higher A method of numbering picture files for a roll of film that has been scanned for computer presentation

$$$ Used by OS/2 to keep track of archived files

@@@ Screen files used in the installation and instruction on use of such applications as Microsoft Code view for C

Read more »

Saturday, September 24, 2011

Support For Android Devices & iOS - uTorrent

The latest version of uTorrent client ( alpha 01/03 25 671 ) now has a video up on your mobile device. Now you can just drag the mouse from the client downloaded files to the player / smartphone / tablet Apple (through iTunes), Android (directly), the console PS3 or XBox (via USB). The automatic conversion of video to mobile devices as long as announced, but does not work. Possibly be connected codecs in one of these builds uTorrent.








Connected to the computer automatically recognized the device (USB) and appear in a new menu. This menu can be hidden, if annoying.






Of course, support for mobile devices is made explicitly for geeks who copy the files in the file manager, and convert in VirtualDub. This function is for a mass audience, for those who still believe uTorrent complex program and can not find the files after downloading.

Wednesday, September 14, 2011

how to track blogger status

Yes Friends, We have blog for especially to track the blogger current, past and future status. Suppose the blogger going to down for maintainable purpose then there will be post with detailed status. They will intimate even you didn't realize or know that problem, Bravo to updater.



Well, i started clicking older post to check this blog last post and i really wondered that they keep sharing from Wednesday, June 20, 2001 till yet. Well according to wiki blogger service was first launched Pyra Labs on August 23, 1999 then in February 2003, Pyra Labs was acquired by Google under undisclosed terms. That is all for today.

Sunday, September 4, 2011

Access Denied Webpage


In the design field there is a deep understanding of intuition vs science. Often designers will stress when trying to perfect a layout. This could be within sizes, positioning, page structure, color theory, or a whole host of other categories. But as you mature your design senses grow with you, making it a lot easier to craft pixel-perfect interfaces. Below i am going to share a Access Denied Page Design that is designed by me. You can see preview and download as well














Saturday, September 3, 2011

captcha pattern determines user gender



Are you a girl or boy ? Now a quick funny examination. Complete this and please do not cheat. Here we go, Count the number of F's in the following text in 15 seconds:





FINISHED FILES ARE THE

RESULT OF YEARS OF SCIENTIFIC

STUDY COMBINED WITH THE

EXPERIENCE OF YEARS



Did you have counted them? How many?
Read more »

Tuesday, August 16, 2011

Firefox, eight will be a lock system of third-party add-ons




Despite the fact that now the latest version of Firefox is version 5.0, in the team blog can be read into the future, with respect to versions of Firefox 7.0 and even 8.0. The eighth version should already appear on November 8, so that the wait is not that long. So, in version 8.0 will attend auto lock ons ​​imposed by third-party programs / sites. When you open a browser built-in security system will check it for third-party add-ons, and warn the user about it. If something suspicious is found, the browser will prompt the user to confirm this setup - will need to tick. Ie in case of damage caused by this addition, the user will only blame myself and no one besides.

Read more »

Friday, August 5, 2011

India and Black Money


As we all know this is the most heated story in India today, many of people blindly following Baba Ramdev & Anna Hazare for same concern. Well I am putting some points after Swiss Bank aggress to return all the back money to Indian government, because all the money is in so huge amount its natural that there will be some good and bad changes occurs in everyone lives. What i guess at this point is there a strong chance that, currencies like USD and Pound get lowered in comparison with Indian Rupee resulting the cutting of outsourced job from those countries. For example outsourced call centers & other software jobs which is feeding Indian employers will shut down. A rough analysis says that 50% call centers will shut down abruptly and all agents working there will get unemployed. Other factors that can affect Indian employers is many industrialist which is doing business in India and saving their black money at Swiss Bank might spot doing business also results unemployment.




Read more »

Wednesday, July 20, 2011

Leads




When i listen this word i got confused? Wot about you? Actually the word leads gets more specific when we use this like business leads, sales leads, lead generation but we use normally as leads. Normally a lead is defined as a complete identification of a person or business entity and used for business growth at different places like call center(s), different companies. Leads may have fewer or additional qualities like TPS registered, ex-directory, country specific like "UK", product specific like product sales lead, business leads, education leads, mortgage leads, survey leads, personal injury leads, payment protection leads and many more specification.




You all know that i have worked for a company that have also a call center wing other than software development and that company unfortunately shut down and the complete 1,000,000 got wasted. Now the offer is here, i giving those leads as a perk for my blog readers. The only thing is that you have to subscribe feeds here :







Subscribe now!Feeds RSS


Read more »

Sunday, July 17, 2011

Prevent DoS Attacks by using LaBrea


One of the most commonly used techniques by hackers is the DoS (Denial of Service) attack,wherein a server is swarmed by repeated requests by one or multiple hosts. This can bring down the server or substantially reduce its performance. It’s difficult to stop such an attack, but there are ways of reducing its effect by distributing the throng of requests over other resources.




Read more »

Wednesday, July 13, 2011

What Mean Business ?


Now blog also means business, one of the fastest growing applications on the Internet, is increasingly making its presence felt in the corporate world. Generally viewed as an online journal that records anything and everything that people think be it about their new car or someone else’s, blogs have moved on to become one of the most potent marketing, PR and CRM tools a company can have. It is easy to customize a blog and companies worldwide are quickly picking up the trend. Besides using the blog to promote themselves, corporate offices use it to maintain a certain level of transparency within their ranks. Companies can also exploit blogs to engender strong relationships with their customers and the media. Here, we attempt to answer some basic questions: What are the uses of a blog? Why is it smart business to have a corporate blog? Who in the company must be allowed to blog? What are the rules that must be followed while maintaining a corporate blog? What sort of companies would gain the most if they set up a blog?




Read more »

Saturday, July 9, 2011

Guide to the path of freelancer or home employment


There is no such thing as a free lunch. Neither is there an easy way to earn money, especially from home. To make yourself employable, you need to ensure that you have the required skill sets as well as good marketing and interpersonal skills. A sound portfolio (for aspiring writers, editors, photographers, designers, etc all) is a must.






Today, several private companies and MNCs are employing people who prefer working out of their homes. A host of opportunities exist for home employment in areas as diverse as telemarketing, selling insurance, data entry, accounting, writing (academic and journalistic writing), editing and proof reading, web design, content development, Internet-based research for companies, graphic design and desktop publishing, programming, audio and video editing, and translation.


With a fair bit of technology skills (typing and word processing skills, being PC literate), entrepreneurs can use the worldwide web to start companies and work from the convenience of their homes. A network security firm in Mumbai, for instance, sourced almost all its initial jobs from the Internet crawling through Google, advertising the website, and improving its page ranking on search engines so that users looking for a certain security solution, would hit their site as soon as they entered the particular keyword. Before you get into the home employment groove, make sure you have the requisite qualifications, hardware, and time management skills to convince potential employers that you are the right person for the job.

Read more »

Thursday, June 30, 2011

A collaborative book about Linux

Hello Folks! Today I want to ask something with you, “is that really important to post article every time?” I didn’t think same that thus uploading old project did by me at the time of my college and got a nice response from my mates with me hoping that you will like too. Although this is project but I compiled whole in a book in a PDF Format named as “A collaborative book about Linux” because it a finding of many webpages that surfed during this Linux documentation project.






Download PDF

You can download the full PDF version for free at the following link.



Download XPS

You can download the full XPS version for free at the following link.










Read more »

Wednesday, June 22, 2011

Which memory cards are available?

Up to this date, there are thirteen basic types of storage media used in digital technology. The most common are several types of memory cards: Compact Flash, CompactFlash Type II, Microdrive, Secure Digital, miniSD, microSD (TransFlash), xD-Picture, SmartMedia, Memory Stick, MultiMedia Card, RS-MMC, DV-RS-MMC, microMMC, micro Memory Stick.



one of the new data storage formats. SD-card different from others is very small (32h24h2.1 mm) and the ability to protect information stored on them from being copied. The advantages of flash cards of this type can also include high-speed read / write, enhanced protection of information on the card from accidental erasure or destruction, mechanical strength and low power consumption. It should be noted that despite the volume indicated on the map of free space on it will be less, because a certain amount of memory needed to ensure the copy protection.



Flash Cards miniSD new standard differ from the standard Secure Digital cards smaller (21.5h20h1.4 mm). To ensure the card in devices with conventional SD-card slot, an adapter is provided.

Read more »

Sunday, June 19, 2011

GSM OPERATORS NAME WITH MCC, MNC

Today i am sharing the list of all GSM operators with their MCC and MNC code. These code are used for different purpose and places. Hoping this will help some users, i using only code name of GSM operators and country name. If you are editing this info then save the file as UNICODE, also remove first two bytes (FF FE). Sequenced as MCC, MNC, OPERATOR NAME.









Read more »

Tuesday, June 14, 2011

Different hot keys for your machine



Here is the list of hot keys to enter the BIOS menu. Many advanced users may want to use the BIOS menu to change the established by default, I / O functions of the computer hardware. In various PCs and laptops boot BIOS menu by using different combinations of keys.


•    Acer (Aspire, Power, Veriton, Extensa, Ferrari, TravelMate, Altos) - [F2] or [DEL]
•    Acer (Altos 600 Server) - [Ctrl] + [Alt] + [Esc] or [F1]
•    Acer (Older PC) - [F1] or [Ctrl] + [Alt] + [Esc]
•    AMI (American Megatrends AMIBIOS, AMI BIOS) - [Delete]
•    AMI (American Megatrends AMIBIOS, AMI BIOS) - Old Version - [F1] or [F2]
•    Award BIOS (AwardBIOS) - [Del]
•    Award BIOS (AwardBIOS) - Old Version - [Ctrl] + [Alt] + [Esc]
•    ALR - [Ctrl] + [Alt] + [Esc] or [Ctrl] + [Alt] + [Del]
•    ARI - [Ctrl] + [Alt] + [Esc] or [Ctrl] + [Alt] + [Del]
•    AST Advantage - [Ctrl] + [Alt] + [Esc]
•    Compaq (Presario, Prolinea, Deskpro, Systempro, Portable) - [F10] - when the cursor in the upper right corner
•    Compaq (Presario, Prolinea, Deskpro, Systempro, Portable) - [F10] - at the time of the show's logo
•    Compaq (Older Computers) - [F1], [F2], [F10], or [Del]
•    Cybermax - [Esc]
•    Dell (XPS, Dimension, Inspiron, Latitude. OptiPlex, Precision, Vostro) - [F2]
•    Dell (Older 486 Models) - [Ctrl] + [Alt] + [Enter]
•    Dell (Some Models) - Reset - press the button twice
•    Dell Dimension L566cx System - [Del]
•    Dell (Older Laptop Models) - [Fn] + [Esc] or [Fn] + [F1]
•    DTK (Datatech Enterprises) - [Esc]
•    eMachines (eMonster, eTower, eOne, S-Series, T-Series) - [Tab] or [Del]
•    eMachine (Some Older Computers) - [F2]
•    Fujitsu (LifeBook, Esprimo, Amilo, Tablet, DeskPower) - [F2] - when a logo
•    Gateway Using Phoenix BIOS (DX, FX, One, GM, GT, GX, Profile, Astro) [F1]
•    Gateway (Some Older PCs) - [F2]
•    Hewlett-Parkard (HP Pavilion, TouchSmart, Vectra, OmniBook, Tablet) - [F1]
•    Hewlett-Parkard (HP Alternative) - [F2] or [Esc]
•    Hewlett-Parkard (HP) Tablet PC - [F10] or [F12]
•    IBM ThinkPad using IBM BIOS (Early Models) - [Ctrl] + [Alt] + [Ins] - when the cursor in the upper right corner
•    IBM ThinkPad using IBM BIOS (Later Models) - [F1] - press and hold
•    IBM ThinkPad using Phoenix BIOS - [Ctrl] + [Alt] + [F11] - from the DOS prompt
•    IBM PS / 1 (Late Models), PS / ValuePoint and 330s - [Ctrl] + [Alt ]+[?]
•    IBM PS / 2 with Reference Partition - [Insert]
•    IBM PS / 2 - [Ctrl] + [Ins] - when the cursor in the upper right corner
•    IBM PS / 2 - 75 and 90 [Ctrl] + [Alt ]+[?]
•    IBM (PC, XT, AT) - [F1]
•    IBM (Older Computers or Notebooks) - [F2]
•    Lenovo (ThinkPad, IdeaPad, 3000 Series, ThinkCentre, ThinkStation) - [F1] or [F2]
•    Lenovo (Older Products) - [Ctrl] + [Alt] + [F3], [Ctrl] + [Alt] + [Ins] or [Fn] + [F1]
•    Microid Research MR BIOS - [F1]
•    Micron (MPC Computers ClientPro, TransPort) - [F1], [F2] or [Del]
•    NEC (PowerMate, Versa, W-Series) - [F2]
•    NEC Versa Notebook - [F1] - press and hold
•    Olivetti PC Pro - [Ctrl] + [Alt] + [Shift] + [Del] - on the numeric keypad
•    Packard Bell (8900 Series, 9000 Series, Pulsar, Platinum, EasyNote, imedia, iextreme) - [F1], [F2] or [Del]
•    Packard Bell (Early 386 and 486 Dodels) - [Ctrl] + [Alt] + [S] - consistently
•    Phoenix BIOS (Phoenix-Award BIOS) - [Del]
•    Phoenix BIOS (Phoenix-Award BIOS) - Old Version - [Ctrl] + [Alt] + [S], [Ctrl] + [Alt] + [Esc], [Ctrl] + [Alt] + [Ins] or [Ctrl ] + [S]
•    Sharp (Notebook Laptops, Actius UltraLite) - [F2]
•    Sharp (Old PCs) - required disk diagnostics to enter the BIOS
•    Shuttle (Glamor G-Series, D'vo, Prima P2-Series, Workstation, X Mini XPC, Surveillance) - [F2] or [Del]
•    Sony (VAIO, PCG-Series, VGN-Series) - [F1], [F2] or [F3]
•    Sony Vaio 320 Series - [F2]
•    Tandon 386 - [Ctrl] + [Shift] + [Esc]
•    Tandon - [Ctrl] + [Shift] + [Esc]
•    Toshiba (Portégé, Satellite, Tecra) - [Esc]
•    Toshiba (Portégé, Satellite, Tecra with Phoenix BIOS) - [F1]
•    Zenith, Phoenix - [Ctrl] + [Alt] + [Ins]




Read more »

Monday, June 13, 2011

Those Who Still Love Xp

Hello there! After a lot of boring article about system admin, i am going to share some windows xp tools and these tool are really very nice to use that. Thus without waiting giving you description and download links



















Read more »

Saturday, June 11, 2011

Control bandwidth with ISA Server


An important measure in controlling the
Internet access is to limit the bandwidth usage. This is needed so, that no
single user can hog all the bandwidth by running something like a download accelerator. 





You can use Microsoft’s ISA Server to limit the amount of bandwidth. We’ll
demonstrate how you can do so. Installing the server is a simple wizard driven process,
so we’ll not get into that. Once installed, go to Start>Programs to access
the Management console. Then double click on the server icon located on the left
side of the window. Next double click on Policy Elements and right click on Bandwidth
Priorities. Then choose New>Bandwidth Priority from the menu and enter low,
medium or high (depending on what you want) and give a description in the description
box. After this you will find two text boxes for specifying outgoing and
incoming value ranging from one to 200. Fill these text boxes with the value. A
higher value means higher priority. Finally, click on OK to finish. 





You can allocate and prioritize bandwidth for different applications using ISA Server


Read more »

Friday, June 10, 2011

Take Control of Internet Access Part 5




Finally, you need to take action based on the reports generated.
The action may include informal warnings, publishing lists of frequent abusers
and using tools to control or limit access. There are tools available to control
specific types of applications, such as chat clients, Kazaa and download accelerators.
Also, there are tools that can perform multiple functions, such as control Web
access and chat simultaneously. Then there are tools that can do application
prioritization to help provide the QoS (Quality of Server) to applications that
really need it. Let’s talk about how to control these applications using various
tools.







For blocking sites, you can use a tool called SurfControl that
needs to be installed on a gateway machine (which in our case was Windows 2000
Advance Server). You can buy SurfControl for Rs 99,000 for 50 users from www.foresightho.com.









During installation, Surf- Control will prompt you to select the
network segment that you want to monitor and control. After installing it,
install MSDE (Microsoft’s SQL Data Engine). SurfControl provides its own
version of MSDE, which contains SurfControl’s rules database as well. The
software uses SQL database to store Web filters and polices.







Create access rules to restrict unwanted Web content,

using SurfControl
Read more »

Wednesday, June 8, 2011

Make Sense of Data Analyze The Reports Part 4





Data Analyze The Reports



Once the reports are made, you need to analyze them periodically
to understand the usage patterns. For instance, you would find that the first
thing all employees do in the morning is check their mail. Hence, you’ll find
heavy Internet usage in the morning. However, if you notice that the usage is
becoming heavy throughout the day then you would need to investigate further.
For all you know, it might be heavy downloads such as movies or music or mass
mailing that’s causing the load. If it’s genuine work that is happening, then you
need to consider purchasing more bandwidth. The same logic applies to other
applications as well, such as ERP applications over your WAN.


Read more »

Tuesday, June 7, 2011

Be Big Brother Monitor Bandwidth And Internet Activity




Now that you have your policy in place, it is time to get your
hands dirty and start implementing the monitoring and controlling measures. You
can monitor everything from Web access, e-mail and websites providing
audio / video streaming to e-commerce transactions and even VPN connectivity
between your various offices.









To check if you are getting the right amount of bandwidth, you need to monitor to see if your ISP is providing you the promised bandwidth and check for other internal bottlenecks, such as any misconfigured or overloaded proxy server.









Many tools are available for this. Some of the better known ones are MRTG, PRTG, PRTG Pro and Ntop. MRTG (Multi-Router Traffic Grapher) is widely used by most ISPs and is available for Windows and Linux. PRTG (Paessler Router Traffic Grapher), a variant of MRTG, is a freeware Windows based tool that lets you monitor only a single network port. Once PRTG is installed, you
need to add a sensor for the network ports you want to monitor. A sensor is
nothing but the IP address of the network card you want to monitor. You also
need to ensure that SNMP is enabled on the machine you are Monitoring, as PRTG uses it for polling and gathering data. The tool provides real-time graphs of the traffic moving in and out of the network port. It can create detailed HTML reports of the bandwidth on a daily, weekly or monthly basis. You should use it to monitor the network port of your Internet Gateway.


Read more »

Sunday, June 5, 2011

First Things First Set a Policy Part 2


Before choosing a tool to manage Internet access, you need to plan its deployment. For example, you need to determine which user or group needs or does not need access to particular sites or service (e-mail, Web, file transfer), which applications consume how much bandwidth and during what time of the day is the maximum traffic flow. On the basis of this information, you need to create an acceptable Internet usage policy. The policy should clearly state:











Read more »

Case Study on Internet Management Part 1


Internet connectivity is one of the most used and abused services
in any organization. Though its usability has been extolled enough, it’s the abusive
that most system administrators pull their hair out over. Most of them know
that their users visit prohibited websites, download music and movies using P2P
applications and chat online. Such activities not only cause network congestion
and deprive other users of bandwidth, but also open connections to unknown
resources on the Net that can bring in viruses and spam. So what can they do about
it?








Case Study on Internet Management








Read more »

Wednesday, June 1, 2011

Delete or Deactivate Google Application






Hello There! I have been using internet for past 10 years and my finding about any service offering website is that sign up or registration process is very easy and user friendly but if you want to deactivate or delete the services its not easily accessible or a little non user friendly. Well this is what i do as Business Development Manager at LIT, New Delhi. At this label i can't change the rule of those companies but what i can do is show you easiest path delete or deactivate those services which not easily accessible thus i start today with Google & Their Services.





Though Google provides a better help service if you got stuck anywhere while using any of its product in-spite of that we can see that there a lot users asking how to delete or deactivate gmail, How to delete a product without having to pay for extra fees?, How do I remove/delete/deactivate a forwarded cell number on GV, How to Deactivate google voice account?, How about deactivate account instead of Delete account option?, I want to delete google voice but apparently that is not an option?, How do I delete or deactivate Google Voice?, Deleting a Google App Engine application?, I don't want to delete my whole Google account?, How To Permanently Delete Gmail, Orkut, Youtube, Google Accounts?, How do I delete, or deactivate my Gmail account? How to Delete a Google or Gmail Account, Canceling your Gmail address?



Read more »

Tuesday, May 31, 2011

About Dmeaon


Hello Readers Out There! Perhaps You All Know Me. Well Who Didn't Know Me, May Call Me As Dmeaon And My Full Name Is Manish Deo, Working As Business Development Manager at LIT At New Delhi, India. Apart From Working As Business Developer, I Am Fond Of Writing Technical & Troubleshooting Articles. My Basic Functional Area Is Security And I Really Want To Be A Computer Security Analyzer But Maybe It Can Feasible After Some Time. 

Thus At This Place We Will be Here With All Type Of Articles Related To Design, Blogging, Security, Popularity, Recent Updates, Troubleshooting, Technical or Non Technical. So, Be With Us And Do Share You Felling About This Another Blog. 


I Just Named My Blog As Dmeaon i.e Certainly Not Human By Hoping That You Will Also Like This On The Behalf Me. Concluding My Post By Saying Cheers!    



7N6Y34J3XEK3