How to print on both side of page in printer

How to print on both side of page in printer

1) Click ctrl+P o bring the print interface.
2) Click on the Properties or the Preferences button in that print page which comes after first steps.
3) Go on to the Finishing Tab.
4) There is a header 'Print Style' and below that is a drop down box.There are three options in that dropdown:-
             1) 1-sided Printing :- To print on one sode of page
             2) 2-sided Printing :- To print on both side of page.
             3) Booklet Printing :- To print in the book Style.

Using Filters to Sort Incoming Email In YAHOO

Using Filters to Sort Incoming Email

Yahoo! Mail lets you create personal folders in which to organize your messages .You can create a filter—a set of rules and a destination—that instructs Yahoo! Mail to automatically deliver incoming messages to the folder of your choice. Each filter has one or more rules and a destination folder. When an email message satisfies the rules, the filter delivers the message into the destination folder.

Follow the below steps:
1) In the upper-right corner of your Yahoo! Mail page, click the Options link, then select Mail Options / More Options  from the menu.
2) On the left side of the page, click the Filters link.
3) On the top of the Filters page, click the Add Filter button.
4) A page appears where you can define the rule and the destination for the new filter.
5) Fill the form.
6) Save the changes.

See Cricket live score in Office

See Cricket live score in Office:

Unable to open the cricinfo.com to view the live scorecard. Try the following links:


Even these sites are not opening then try igoogle.
Still u r not able to view the score then only option is to try search cricket online/live score on google.

Getting Java Compilation Error

Getting Java Compilation Error When Compiling JDBC with java 1.5

When we try to compile  some java project with Java 1.5 compiler, we get the error

[javac] Please remove or make sure it appears in the correct subdirectory of the classpath.
[javac] import oracle.sql.ARRAY;
[javac]                              ^
[javac] 1 error

This is because java 1.5 compiler doesn't support oracle.sql.ARRAY, so to remove this compilation error we need to upgrade the java compiler from 1.5 to java 1.6. The Java compiler 1.6 support all this classes as well as the old classes of java 1.5. Java 1.6 can be downloaded from Java Sun website.

How To Find HostName Of Computer

How To Find HostName Of Computer

The Hostname of the computer is the name of the computer. To find the hostname of the computer follows

the given steps:

1) Right Click on 'My Computer'
2) Open the properties
3) Click on the 'Computer Name' tab
4) You can find the Hostname of computer there by the tag name 'Full Computer Name'

BlackBerry 3G Mobiles

BlackBerry 3G Mobiles

These are the different Blackberry Phone which support 3G.





Google Chrome Link Broken Error

Oops! This link appears to be broken

Sometimes google Chrome throws the DNS Server error message,saying "DNS Error-cannot find server" when we try to open some sites.But using the different browser we can open the site without showing any errror.Google Chrome browser use its own algorithm to read the web pages.When you visit a webpage (like a search results page), Google Chrome will pre-fetch the IP addresses of all websites that are listed on that page. Since the browser has the IP addresses of all the links in advance, DNS pre-fetching ensures that any links that may you click on that webpage will load faster. However, when pre-fetching fails, something that’s not very uncommon, you may get the “link broken” error.

How To Tackle This Error?

The fix is simple – go to Tools > Options (or Preferences on a Mac) > Under the Hood and uncheck the setting that says “Use DNS pre-fetching to improve page load performance.” This might increase the loading time of certain pages by a few microseconds but you won’t at least see that misleading error message.

Enable Page Rank Button In IE8

Enable Page Rank Button In IE8

To add page rank button in your explorer, you need to install the toolbar,google toolbar is the best one.
If you installed new Internet Explorer 8 or upgraded to IE8 from IE7,Google toolbar does not came enabled by default with pagerank button.But we can manually enable PageRank button for Google Toolbar very easily.
Enabling PageRank button for Google Toolbar in Internet Explorer

1. Click the Wrench icon on the Google Toolbar>select Tools>check or enable pagerank and save.

2.You can now see the PageRank button appearing for web pages you visit in Internet Explorer.

Virus vs. Worm - What's the Difference?

Virus vs. Worm – What’s the Difference?

Below you will find information gathered from several resources on the Internet regarding the differences between viruses and worms.
A computer virus is delivered by e-mail messages, according to most definitions.
But a computer worm spreads through the internet.

Viruses are computer programs that are designed to spread themselves from one file to another on a single computer. A virus might rapidly infect every application file on an individual computer, or slowly infect the documents on that computer, but it does not intentionally try to spread itself from that computer to other computers. In most cases, that’s where humans come in. We send email document attachments, trade programs on diskettes, or copy files to file servers. When the next unsuspecting user receives the infected file or disk, they spread the virus to their computer and so on.

Worms, on the other hand, are insidious because they rely less (or not at all) on human behavior in order to spread themselves from one computer to another. The worm is a program that is designed to copy itself from one computer to another over a network (e.g., by use email). The worm spreads itself to many computers over a network, and doesn’t wait for a human being to help. This means that computer worms spread much more rapidly than computer viruses.

Malware” is the term used to describe any and all malicious software, including viruses, Trojan horse programs, and worms.

Even though "virus" has become a generic term to refer to all types of computer malware, it actually only applies to one specific type of malicious code/file. A computer virus does the same thing a biological virus does, for the most part. It infects a “host” (a file, boot sector, etc.) and then looks for ways to spread. The major things setting it apart from other malware are that it (1) replicates itself and (2) infects other files instead of existing as a standalone file. Viruses can be very harmful (e.g., erasing or damaging files) or they can be relatively benign (e.g., displaying an obscene message to the user on a given date).

Worms do not attach themselves to a host program or file the way a virus does; worms reside in active memory and stand alone with no need for a host. A worm does replicate itself like a virus, but it doesn’t do so by altering files. Instead, it replicates over computer networks.

A Trojan horse program does not replicate itself, and it does not infect other files. A Trojan horse program (or, simply, “trojan” or “Trojan program”) is a malicious program that is contained within, or masquerades as, an innocent and useful program. The most widespread type of Trojan program is the type that installs “backdoor” access to a computer, through which a malicious person is allowed to remotely take control of the infected computer. The next most popular type is designed simply to steal passwords, credit card numbers, online banking data, or other personal information and send that information back to the malicious party. Often, a Trojan program arrives, unknown to the victim, along with a screensaver or game. When the screensaver or game is run, it is designed to then install the Trojan program that is included with it.

How to make a backup copy of a .pst file

How to make a backup copy of a .pst file

Follow these steps to back up the whole .pst file:

   1. Close any messaging programs such as Outlook, Microsoft Exchange, or Microsoft Windows     Messaging.
   2. Click Start, and then click Run. Copy and paste (or type) the following command in the Open box, and  then press ENTER:
      control panel
      Control Panel opens.
      Note If you see the Pick a category screen, click User Accounts, and then go to step 3.
   3. Double-click the Mail icon.
   4. Click Show Profiles.
   5. Click the appropriate profile, and then click Properties.
   6. Click Data Files.
   7. Under Name, click the Personal Folders Service that you want to back up. By default, this service is called Personal Folders. However, it may be named something else.
      Note If you have more than one Personal Folders Service in your profile, you must back up each set of .pst files separately.
      If there are no entries called Personal Folders and you have not yet stored any information such as messages, contacts, or appointments in Outlook, you probably have not yet enabled the Personal Folders Service. Go to the "References" section for information about how to create a .pst file.
      If you have no Personal Folders Services in your profile and you can store information such as messages, contacts, or appointments in Outlook, your information is probably being stored in a mailbox on an Exchange Server. Try using the instructions in the "How to back up .pst file data that is located on a Microsoft Exchange Server" section.
   8. Click Settings, and then note the path and file name that appears.
      Note Because the .pst file contains all data that is stored in the MAPI folders that Outlook uses, the file can be very large. To reduce the size of the .pst file, click Compact Now in the Settings window.
   9. Close all the Properties windows.
  10. Use Windows Explorer or My Computer to copy the file that you noted in step 8. You can copy the file to another location on the hard disk drive or to any kind of removable storage media, such as a floppy disk, a CD-ROM, a portable hard disk drive, a magnetic tape cassette, or any other storage device.

What Is A IMEI Number

What Is A IMEI Number

IMEI=International Mobile Equipment Identification
IMEI is a 15-digit code assigned to a mobile handset. It helps to identify a stolen handset and also helps the security agencies to track the users. No two mobile phones have same IMEI number, since it’s a unique number.

How To Check Your Mobile Phone’s IMEI Validity
1. On your mobile’s home screen, type in the following code ” *#06# ” (Without quotes). Otherwise check the compliance plate under the battery.

2. Type an SMS “IMEI {followed by your} (15 digit IMEI No.) and send it to 53232.
For example, type IMEI 123456789012345 and send it to 53232. and Rs.3/- charge for each SMS.
‘Success’, is displayed, if your IMEI number is Valid.
‘Invalid IMEI’, is displayed for incorrect IMEI.

3. You can also check your IMEI number validity online. For that, you have to go to those sites that provide this facility and put your IMEI number in the given box. Within few minutes after verifying, you will be intimated whether your IMEI number is legitimate or not.

The IMEI Number has the following structure.
The first two digits indicated by NN is the code of the reporting body such as MSAI. The next six digits indicated by XXXXXX is the type identifier defined by MSAI. These numbers are assigned by MSAI but is given to the mobile equipment manufacturers for identifying different handsets uniquely. The last digit denoted by A is a check digit that is a function of the previous 14 digits and is used to check that none of the digits are entered incorrectly.

If you know your IMEI number you can check your device status by visiting TrackIMEI.com and entering the IMEI number. You’ll get the information about the handset you are using and also you’ll know if there is any theft record of the phone.

Remotely Enabled Remote Desktop

Remotely Enabled Remote Desktop
If there is a computer in your network and  you are not able to make a remote connection with it because remote connectivity has been disabled. To connect that computer remotely do the following:
1) Start Registry Editor by Start -- Run -- regedit -- OK. Then select the Connect Network    Registry option under the File menu.
2) This opens the Select Computer search box. Either browse Active Directory to locate the remote server,  or type its name in the textbox.
3) Click OK and a node will be displayed in Registry Editor for the remote machine.
4) Now browse HKLM on SRV to find the following Registry key.
    HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server
5) Under the Terminal Server key, you'll find a REG_DWORD value named fDenyTSConnection. Double- click on that value to open the Edit DWORD Value box and change the value data from 1 (Remote Desktop disabled) to 0 (Remote Desktop enabled),
6) The remote machine needs to be rebooted for the change to take effect, so open a command prompt and  type the following command:
             shutdown -m \\computer name -r
7) After the remote machine reboots, Remote Desktop should be enabled on it. Connect remotely..

Restart Oracle Server On Linux

Restart Oracle Server On Linux

The oracle server get closed when the machine on which oracle has been installed get turnoff or shutdown.The Oracle server doesn't start of its own when the m/c is restarted.So,Follow the given below steps to start the oracle server when it get closed due to shutdown of the computer:

Steps to start Oracle Listener :-
1.       Login as oracle/oracle
2.       sqlplus  /nolog
3.       connect /as sysdba
4.       startup

Customize Internet Explorer

Customize Internet Explorer

Open Internet Explorer to a Blank Page
  • Create a new Desktop shortcut

  • In the command line, (highlight and paste the below)
    "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome

  • Name the shortcut: (example) IE Blank
    From now on you can paste a saved URL without loading your ISP software, etc.

  • You can also drag this shortcut into your Quick Launch area.
    Note: this is the same as setting your Home Page to: "about:blank"
    Ad-Aware users, setting your page to "About:Blank" causes a false CWS detection.

  • SendTo Tip

  • Add Internet Explorer to your SendTo folder

  • Start - Run (type) "sendto" (no quotes) File - New - Shortcut (XP only)

  • In the command line, (highlight and paste the below - including quotes)
    "C:\Program Files\Internet Explorer\IEXPLORE.EXE"

  • Note: IE supports opening: .gif, jpg, htm, html, .txt, ico, etc.
    Windows Vista users will need to navigate to the following location:
    Start | Run (type) shell:sendto (click Ok)
    Right-click in the right pane and select: New > Shortcut
    In the command line, (highlight and paste the below - including quotes)
    "C:\Program Files\Internet Explorer\IEXPLORE.EXE"

    Fast Printing web pages without images
  • Create a one line .css file [example] "NoImages.css", copy the below line to Notepad and Save As: NoImages.css. Open Internet Options | General tab | Accessibility button, place a check in "Format documents using my style sheet", click OK.

  • Code:
    IMG { display: none !important;}

  • The next time you want to print the contents of a web page but don't want to waste the time and ink printing all the ads, banners, etc. just Toggle the above option on\off.

  • Note: there is no need to restart IE as this trick works on the fly.

    Protecting Your Internet Explorer
    Lately there has been a rash of incidents where either a web site or email spam has contained a hidden javascript that changes your Home Page entry, then disables the users ability to change it back. To prevent this from happening ... be one step ahead of these characters. Set your Home Page then disable the ability to change it via a Registry restriction. It is also recommended you use a Startup Monitor. Be aware that in some cases this method does not work as some of these parasites will re-write the registry entries on each restart. However a "Startup Manager" will prompt you if your setting are being changed.

    HKCU_Hide_HomePage.reg (Current User) 
    HKCU_Undo_HomePage.reg (Current User)

    To download: Right-click the above link(s) and select: "Save Target As".
    To use: right-click and select: Merge (to view: open in Notepad)

    Note: this restriction can apply in 2 locations, the Registry checks the HKLM location first, then the HKCU location. The HKLM takes precedence and applies to all users. The HKCU applies to just the "Current User". 
    If your HomePage gets hijacked, you may need to "undo" both locations.
    Note: XP Pro already has the ability to make these changes via the Group Policy Editor. If the HomePage restriction has been applied by an Administrator, "Limited Users" can not make this change. Start | Run (type) gpedit.msc

    Resize your IE Cache size (XP)

    By default IE reserves 10% of your drive space for the Temporary Internet Files. This was fine several years ago but since then the hard drive capacities have increased dramatically. If you happen to have one of these large disks the 10% is truly unnecessary and wasteful.

    • Close all instances of Internet Explorer and Outlook Express
    • Control Panel | Internet Options | General tab
    • Click Settings and move the slider to 50 mb, click Ok
    • Click Delete Files and also select: "Delete all offline files", click Ok
    • Click Clear History, click Ok, Apply/Ok 

    Note: While viewing Newsgroup messages Outlook Express dumps a series of zero-byte files into the browser cache. When Outlook Express is closed it fails to cleanup these files. To delete these zero-byte files you must select the above option  "Delete all offline files".

    TIFF Image Viewer

    AlternaTIFF is a web browser add-on (ActiveX control or plug-in) that displays most of the common types of TIFF files.

    Spell Checker for Internet Explorer

    Editors Note: has an option to integrate the database from other spell checkers.

    Agent Ransack (freeware) File searching software (XP only)
    This is not a replacement to Microsoft's built-in Search Utility, it's just much faster!