How to print on both side of page in printer
Spiga
Thursday, November 18, 2010 at 5:29 PM Posted by SONU MISHRA
How to print on both side of page in printer
Labels: Microsoft 1 comments
Friday, October 15, 2010 at 4:58 PM Posted by SONU MISHRA
Using Filters to Sort Incoming Email
Labels: mail, Yahoo 0 comments
Wednesday, August 25, 2010 at 3:39 PM Posted by SONU MISHRA
See Cricket live score in Office:
Unable to open the cricinfo.com to view the live scorecard. Try the following links:
http://scores.sify.com/index.shtml
http://in.wap.yahoo.com/p/cricket-india/LiveScore?match=1
Even these sites are not opening then try igoogle.
Still u r not able to view the score then only option is to try search cricket online/live score on google.
Labels: Internet explorer, office 2 comments
Thursday, August 19, 2010 at 3:26 PM Posted by SONU MISHRA
Getting Java Compilation Error When Compiling JDBC with java 1.5
When we try to compile some java project with Java 1.5 compiler, we get the error
[javac] Please remove or make sure it appears in the correct subdirectory of the classpath.
[javac] import oracle.sql.ARRAY;
[javac] ^
[javac] 1 error
This is because java 1.5 compiler doesn't support oracle.sql.ARRAY, so to remove this compilation error we need to upgrade the java compiler from 1.5 to java 1.6. The Java compiler 1.6 support all this classes as well as the old classes of java 1.5. Java 1.6 can be downloaded from Java Sun website.
Labels: java 0 comments
Wednesday, August 18, 2010 at 7:11 PM Posted by SONU MISHRA
How To Find HostName Of Computer
The Hostname of the computer is the name of the computer. To find the hostname of the computer follows
Labels: Win XP 0 comments
Wednesday, March 24, 2010 at 6:04 PM Posted by SONU MISHRA
BlackBerry 3G Mobiles
These are the different Blackberry Phone which support 3G.
blackberry-curve-8900
Labels: 3G, Blackberry 1 comments
Tuesday, March 16, 2010 at 1:25 PM Posted by SONU MISHRA
Oops! This link appears to be broken
Sometimes google Chrome throws the DNS Server error message,saying "DNS Error-cannot find server" when we try to open some sites.But using the different browser we can open the site without showing any errror.Google Chrome browser use its own algorithm to read the web pages.When you visit a webpage (like a search results page), Google Chrome will pre-fetch the IP addresses of all websites that are listed on that page. Since the browser has the IP addresses of all the links in advance, DNS pre-fetching ensures that any links that may you click on that webpage will load faster. However, when pre-fetching fails, something that’s not very uncommon, you may get the “link broken” error.
How To Tackle This Error?
The fix is simple – go to Tools > Options (or Preferences on a Mac) > Under the Hood and uncheck the setting that says “Use DNS pre-fetching to improve page load performance.” This might increase the loading time of certain pages by a few microseconds but you won’t at least see that misleading error message.
Labels: Chrome, Web Browser security 0 comments
Friday, March 12, 2010 at 5:30 PM Posted by SONU MISHRA
Enable Page Rank Button In IE8
To add page rank button in your explorer, you need to install the toolbar,google toolbar is the best one.
If you installed new Internet Explorer 8 or upgraded to IE8 from IE7,Google toolbar does not came enabled by default with pagerank button.But we can manually enable PageRank button for Google Toolbar very easily.
Enabling PageRank button for Google Toolbar in Internet Explorer
Labels: Internet explorer 0 comments
Monday, March 8, 2010 at 3:31 PM Posted by SONU MISHRA
Virus vs. Worm – What’s the Difference?
Below you will find information gathered from several resources on the Internet regarding the differences between viruses and worms.
A computer virus is delivered by e-mail messages, according to most definitions.
But a computer worm spreads through the internet.
Viruses are computer programs that are designed to spread themselves from one file to another on a single computer. A virus might rapidly infect every application file on an individual computer, or slowly infect the documents on that computer, but it does not intentionally try to spread itself from that computer to other computers. In most cases, that’s where humans come in. We send email document attachments, trade programs on diskettes, or copy files to file servers. When the next unsuspecting user receives the infected file or disk, they spread the virus to their computer and so on.
Worms, on the other hand, are insidious because they rely less (or not at all) on human behavior in order to spread themselves from one computer to another. The worm is a program that is designed to copy itself from one computer to another over a network (e.g., by use email). The worm spreads itself to many computers over a network, and doesn’t wait for a human being to help. This means that computer worms spread much more rapidly than computer viruses.
“Malware” is the term used to describe any and all malicious software, including viruses, Trojan horse programs, and worms.
Even though "virus" has become a generic term to refer to all types of computer malware, it actually only applies to one specific type of malicious code/file. A computer virus does the same thing a biological virus does, for the most part. It infects a “host” (a file, boot sector, etc.) and then looks for ways to spread. The major things setting it apart from other malware are that it (1) replicates itself and (2) infects other files instead of existing as a standalone file. Viruses can be very harmful (e.g., erasing or damaging files) or they can be relatively benign (e.g., displaying an obscene message to the user on a given date).
Worms do not attach themselves to a host program or file the way a virus does; worms reside in active memory and stand alone with no need for a host. A worm does replicate itself like a virus, but it doesn’t do so by altering files. Instead, it replicates over computer networks.
A Trojan horse program does not replicate itself, and it does not infect other files. A Trojan horse program (or, simply, “trojan” or “Trojan program”) is a malicious program that is contained within, or masquerades as, an innocent and useful program. The most widespread type of Trojan program is the type that installs “backdoor” access to a computer, through which a malicious person is allowed to remotely take control of the infected computer. The next most popular type is designed simply to steal passwords, credit card numbers, online banking data, or other personal information and send that information back to the malicious party. Often, a Trojan program arrives, unknown to the victim, along with a screensaver or game. When the screensaver or game is run, it is designed to then install the Trojan program that is included with it.
Labels: Virus, worms 0 comments
Friday, February 26, 2010 at 5:01 PM Posted by SONU MISHRA
Labels: email, Microsoft, outlook 2 comments
Thursday, February 11, 2010 at 6:17 PM Posted by SONU MISHRA
What Is A IMEI Number
IMEI=International Mobile Equipment Identification
IMEI is a 15-digit code assigned to a mobile handset. It helps to identify a stolen handset and also helps the security agencies to track the users. No two mobile phones have same IMEI number, since it’s a unique number.
How To Check Your Mobile Phone’s IMEI Validity
1. On your mobile’s home screen, type in the following code ” *#06# ” (Without quotes). Otherwise check the compliance plate under the battery.
2. Type an SMS “IMEI {followed by your} (15 digit IMEI No.) and send it to 53232.
For example, type IMEI 123456789012345 and send it to 53232. and Rs.3/- charge for each SMS.
‘Success’, is displayed, if your IMEI number is Valid.
‘Invalid IMEI’, is displayed for incorrect IMEI.
3. You can also check your IMEI number validity online. For that, you have to go to those sites that provide this facility and put your IMEI number in the given box. Within few minutes after verifying, you will be intimated whether your IMEI number is legitimate or not.
The IMEI Number has the following structure.
NN-XXXXXX-ZZZZZZ-A
The first two digits indicated by NN is the code of the reporting body such as MSAI. The next six digits indicated by XXXXXX is the type identifier defined by MSAI. These numbers are assigned by MSAI but is given to the mobile equipment manufacturers for identifying different handsets uniquely. The last digit denoted by A is a check digit that is a function of the previous 14 digits and is used to check that none of the digits are entered incorrectly.
If you know your IMEI number you can check your device status by visiting TrackIMEI.com and entering the IMEI number. You’ll get the information about the handset you are using and also you’ll know if there is any theft record of the phone.
Labels: MOBILE 2 comments
Tuesday, January 12, 2010 at 7:17 PM Posted by SONU MISHRA
Remotely Enabled Remote Desktop
If there is a computer in your network and you are not able to make a remote connection with it because remote connectivity has been disabled. To connect that computer remotely do the following:
1) Start Registry Editor by Start -- Run -- regedit -- OK. Then select the Connect Network Registry option under the File menu.
2) This opens the Select Computer search box. Either browse Active Directory to locate the remote server, or type its name in the textbox.
3) Click OK and a node will be displayed in Registry Editor for the remote machine.
4) Now browse HKLM on SRV to find the following Registry key.
HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server
5) Under the Terminal Server key, you'll find a REG_DWORD value named fDenyTSConnection. Double- click on that value to open the Edit DWORD Value box and change the value data from 1 (Remote Desktop disabled) to 0 (Remote Desktop enabled),
6) The remote machine needs to be rebooted for the change to take effect, so open a command prompt and type the following command:
shutdown -m \\computer name -r
7) After the remote machine reboots, Remote Desktop should be enabled on it. Connect remotely..
Labels: remote desktop 0 comments
Monday, January 11, 2010 at 5:16 PM Posted by SONU MISHRA
Labels: Oracle 0 comments
Thursday, January 7, 2010 at 3:27 PM Posted by SONU MISHRA
Note: IE supports opening: .gif, jpg, htm, html, .txt, ico, etc.
Windows Vista users will need to navigate to the following location:
Users\\AppData\Roaming\Microsoft\Windows\SendTo [or]
Start | Run (type) shell:sendto (click Ok)
Right-click in the right pane and select: New > Shortcut
In the command line, (highlight and paste the below - including quotes)
"C:\Program Files\Internet Explorer\IEXPLORE.EXE"
Note: there is no need to restart IE as this trick works on the fly.
Note: While viewing Newsgroup messages Outlook Express dumps a series of zero-byte files into the browser cache. When Outlook Express is closed it fails to cleanup these files. To delete these zero-byte files you must select the above option "Delete all offline files".
Labels: Internet explorer 1 comments