Here are some of the small softwares. I hope It will be usefull to You.
Icon Changer
Most of the people can't change icon of executable files through resource hacker so i am sharing a small application with you Download Link :- http://www.4shared.com/file/arn9lLXo/Simple_Icon_Changer.html -
Note :- 1. you need .NET framework to use this application
2. It is not coded by me
Ringplus
It provides free calls to its users...
1) Open http://www.ringplus.net
2) Sign up with them
3) Dial one of the many access numbers, enter your account number and pin(1st time only).
4) Dial 011 + country code( 91--for India ) + destination number whatever only cell phone recommended.
5) Listen to an advertisement while you wait till your party picks up the phone.
6) Talk to them for the period specified. Actually that site get paid when we are hearing their advertisement during calling.i.e Instead of hearing tring tring or ring ring we will listen their advertisment , so they are providing small duration of time for calling.But after that use 7 step again and have fun.
7) When it gets disconnected repeat steps 3 to 7 to enjoy unlimited free calls to India and rest of the world.
Whenever we press ‘Alt+Tab’ key combination in Windows Vista and 7, it shows a new improved screen which shows running applications with their live thumbnails so that you can see the window before switching to them.
The ‘Alt+Tab’ switcher screen also shows ‘Desktop’ in the list so that you can directly access Desktop icons without minimizing all running applications manually.
It’s a good feature but some people might find it annoying as it takes some time to show the switcher screen and selecting the running application. If you also find it annoying and want to get back the old Windows XP styled classic ‘Alt+Tab’ Switcher screen in Windows Vista and 7, this below mentioned steps will surely help you.
Please follow these simple steps:
Step 1: Type regedit in Run or Startmenu search box and press Enter. It’ll open Registry Editor.
Step 2: Now go to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
Step 3: In right-side pane, create a new DWORD value AtlTabSettings and set its value to 1.
That’s all. Now whenever you’ll press ‘Alt+Tab’ keys together, it’ll show Windows XP styled classic Switcher screen.
To restore default Aero enabled ‘Alt+Tab’ Switcher screen, just delete the AltTabSetting DWORD value which you created in step 3. Log off and Login again to take effect.
Controlling One PC from Another with Remote Desktop Sharing
Remote Desktop Sharing (RDS) is a NetMeeting-related capability that enables you to thoroughly control one computer from another computer using that computer’s mouse, keyboard, and monitor. This is great for certain types of technical support. If you have a problem with your computer, for example, you can turn control of the computer over to an expert who can examine things from his current location. The expert might even be able to fix the problem on your screen as you watch. If you’re looking to give someone else control of your computer for technical support, you might find it easier to use the Remote Assistance feature. If you have an “always on” connection to the Internet (such as cable or DSL) and your computer has its own IP address on the Internet, you also can access that computer remotely (that is, from any other computer on the Internet). For example, you can use RDS to share your computer’s entire desktop and leave your computer on. Then, while you’re out on the road, you could connect to the Internet and actually control that home or office computer from wherever you happen to be located at the moment.
The Setup
To share control of a PC, you first need to be at that PC and do some configuring. You must have an account on the computer that has administrative privileges, and be logged on to that account. The account needs to have a password. You can use your existing account, or create a new account specifically for RDS. For this example, we’ll go through the steps of creating a unique RDS account. Assuming you’re already logged on with administrative privileges, here’s how you would proceed:
1. Click the Start button and choose Control Panel.
2. Open the User Accounts icon.
3. Choose Create A New Account.
4. Enter a name for the account, such as RDS Users, and click the Next button.
5. Choose Computer Administrator and then click the Create Account button.
6. Choose Change an Account.
7. Click the name of your new account (for instance, RDS Users).
8. Choose Create Password.
9. Enter a password (twice) and optionally a password hint
10. Click the Create Password button.
11. Close the User Accounts window and Control Panels.
Determine the computer’s name and IP address
Next you need to determine this computer’s name and/or IP address. If you plan to manage this computer from within your local area network only, either the name or IP address will do. To access this computer via the Internet, you need the computer’s IP address. To determine the computer’s name, follow these steps:
1. Click the Start button and then right-click My Computer and choose Properties.
2. Click the Computer Name tab. The computer’s name appears next to Full Computer
Name Client
3. Click the Cancel button to close the dialog box without making any changes.
To determine the computer’s IP address, follow these steps:
1. Start NetMeeting from the Start menu.
2. Choose Help → About Windows NetMeeting from NetMeeting’s menu bar.
3. The computer’s IP address appears near the bottom of the dialog box.
Configuring RDS
The next step in allowing this computer to be operated remotely involves configuring NetMeeting to provide the capability. A simple wizard will help you do this:
1. If NetMeeting isn’t already open on the desktop, go ahead and start NetMeeting normally.
2. Choose Tools → Remote Desktop Sharing from NetMeeting’s menu bar.
3. Read the first couple of wizard screens and then click the Next button.
4. In the wizard screen that enables you to create a password-protected screen saver, choosing Yes will allow you to set up a screen saver that prevents others from using the computer while it’s being used remotely. Click the Next button to display the Screen Saver tab of the Desktop Properties dialog box. To accept the suggested screen saver, just click the OK button to close the dialog box and return to the wizard.
5. Read the last wizard page, and then click its Finish button.
A new icon will be available in the Notification area of the desktop.
Before you leave, or turn over control . . .
Now that the computer is capable of being operated from afar, you can do some things to help make the whole process easier. For starters, if you created a separate account for remote use, such as our RDS Users account, log onto that account. If you want to be able to access some other account (such as your own account) from afar, log on to that account instead. Then consider changing the display resolution to 640 x 480, if possible. That will enable your entire desktop to fit inside a window on the calling computer, provided that computer is using some higher resolution. Also, if your computer has multiple monitors, you should disable all but the main monitor, because it’s unlikely that the calling computer will be able to access the additional monitors. You can change the resolution and deactivate extra monitors via the Display Properties dialog box that appears when you right-click the desktop and choose Properties.
Next you need to set up the computer to “listen” for incoming calls that request control of the desktop. This step is vital, so it’s imperative that you perform it before you leave the computer. Likewise, if you’ll be turning over control of your computer to someone else, you must perform this step before that person calls in to take control of the computer. Here’s how you tell the computer to “listen” for the incoming request:
1. Right-click the new NetMeeting icon in the Notification area.
Select Activate Remote Desktop Sharing to allow this computer to be managed from afar.
2. Choose Activate Remote Desktop Sharing.
If you plan to leave the computer unattended while it’s being used remotely, be sure that the computer is on and ready to accept the call when the time comes. If you’re using power management options to power down your computer after a period of inactivity, disable those options before you leave the computer. Use the Power Options icon in Control Panel (Start → Control Panel) to set your System Standby option to Never. (It’s okay to let the monitor and hard disk power down after a while.) Some modern computers have a Wake On LAN capability built in to them. This enables the computer to go into a suspended state while not in use and then instantly “wake up” as soon as a request for resources comes through the network. If your computer has that capability, you’ll probably need to set it up in the system BIOS. Typically the only way to get to the BIOS setup is to watch for a message that reads Press del key to Enter Setup right after you start the computer. You’ll only have a few seconds to press the specified key. I can’t give you much more advice than that though, because different computers have different BIOS chips and setup programs. You can check the written documentation that came with your system (or the system’s motherboard) for more information on its BIOS capabilities and setup program. The main thing to remember, however, is that if you want to access the computer from afar and nobody will be sitting there to accept your NetMeeting call, the computer has to be turned on and running when the call comes in. You can log off from the computer, however, by clicking the Start button and choosing Log Off → Log Off.
Turning over control
If you’ll just be turning over control of this computer to someone else, you’re done. When that person dials in to the computer, you will probably just see him doing whatever it is he needs to do. The mouse pointer will just move about the screen as though Casper the Ghost were sitting at your computer working its keyboard and mouse. When that user hangs up, you get control back. Now consider how it works from the other end, with you as the person who is elsewhere and calling in to control this computer.
Accessing an unattended desktop
Suppose you are away from the computer that’s listening for RDS requests. You want to get into that computer and control it from your current location. To do so, you need to follow these steps: 1. On whatever computer you’re using at the moment, start Microsoft NetMeeting.
2. Click the Place Call button.
3. In the To box, type the IP address of the remote computer. If you are calling from a computer that’s part of the same local area network, you can enter the computer’s name instead.
4. Select the Require security for this call option so that its check box is filled (this is important!)
5. Click the Call button in the dialog box.
6. In the next dialog box to appear, enter your user name (or the name of the account you created for RDS) and password required only when contacting networks that use the Windows NT/2000 domain system of security.
7. Click the OK button.
A window opens on your desktop, displaying whatever is currently visible on the remote computer’s screen. From here on out, you can operate that computer normally within the window. If you choose View → Full Screen from the window’s menu bar, you will, in essence, replace your desktop with their desktop. You can use the Restore button that appears in the upper-right corner of the Full Screen view to reduce that remote desktop to a window, when convenient.
Transferring files during RDS
As you’re working a computer from afar, you might think that you can copy files from that remote computer to the current computer just using standard drag-and-drop techniques. However, that’s not how it works. Instead, what you need to do is run NetMeeting on the remote computer and click the Transfer Files button in that computer’s copy of NetMeeting. Go through the standard method described earlier in this chapter to select and send the files that you want to copy. After you click the Send button, the files will, of course, be sent to the computer at which you’re currently sitting. You can accept or reject them, just like you could if someone else had sent them to you. If you’re not given an option to place them in a specific folder on the local computer, they’ll probably end up in the C:\Program Files\NetMeeting\ Received Files folder, which is the default for storing transferred files.
Ending Remote Desktop Access
When you’ve finished using the remote computer, click the Hang Up button in NetMeeting’s window. You can also close NetMeeting if you like.
Note : All these things can be achieved by a simple software called teamviewer. It is free to download and easy to install. Read my review for Team Viewer later in this section.
Software Review – Folder Lock
Folder Lock® is a fast data encryption and password protection software for Windows. It can simultaneously encrypt, lock and password protect your files, folders, drives, USB drives and even CD/DVD-RW.
Folder Lock creates encrypted storages called 'Lockers'. You can keep as many of your private files & folders in your Locker and password protect it with a single click. You can transfer, secure and backup these Lockers. Lockers are portable, you can keep them in USB Flash Drives, CD/DVD (R-RW), & notebooks or transfer them via email or upload. Lockers are even undeletable on the computer where Folder Lock is installed.
You can treat Lockers just as you would treat them in physical world. Each user can have their own Lockers. However, a single user can create multiple Lockers with different passwords as well. With Folder Lock, you can choose either to encrypt using 256-bit AES on-the-fly encryption or lock files, folders and drives anywhere on your computer. Each Locker can contain your encrypted files as well as your personal list of locked items.
Folder Lock locks the computer if too many incorrect password attempts are made and keeps a log of them all. If you activate Stealth Mode, all traces, shortcuts, Program Files folder and Add/Remove icon of Folder Lock gets invisible. You can then run the program with your choice of hotkey. The program also shreds the original files when you move your data to a locker. Furthermore, the recent document history, find files history and copy/clipboard data is cleared every time the Locker closes.
Furthermore, Folder Lock's options like hack attempt monitoring, stealth mode, data shredding, history cleaning and auto protection can enhance data security beyond anything ever achieved. In addition, a locker's delete, move and rename are password protected to prevent data loss.
Folder Lock is Windows Vista / 2003 / XP / 2000 compatible and is the most downloaded File Security program in the market today.
Some Features
- Users have an option whether to Encrypt or Lock, choices useful for both power users and casual users. Those who want ultimate security, can choose encrypiton. those who want ultimate speed, can choose locking.
- Both Encryption and Locking are exceptionally fast. No competitor is offering this speed while offering 100% secure 256-bit AES Encryption.
- The Lockers can’t be deleted on the computer where Folder Lock is installed and Folder Lock can't be uninstalled without the correct password.
- Users who want to protect files on multiple locations on their hard disk, not just on the C: drive, can easily protect their files on another partition by copying the 'Lockers' from one place to another or by simply using the 'Lock' feature.
- Secure and very strong Encryption. A strong industry standard 256-bit AES Encryption is used to encrypt your files for maximum protection. It is one of the most trusted encryption algorithms used in United States Military.
- Folder Lock doesn't save the password in the registry or the disk, preventing hackers and crackers.
- Protects important files from viruses, hackers, crackers, trojans, malware, spyware, worms, malicious programs and scripts. Protects files from network computers if you do not want to share files on network. Also protects files from hacker tools when you connect to the internet.
- While using the Lock feature, users can choose to lock & hide their files simultaneously. Locked & Hidden files are unrenameble, undeletable, unmovable and totally inaccessible. There is no limit to the size of data or the type of files you can protect.
Can be downloaded from the following magnet and it is free of viruses. You all need is a bit torrent client to download the same.
magnet:?xt=urn:btih:E6I76RKWMKBOGSP7AIDTOFWMUUN7VNUV
Some snapshots from the programme
Hello Mac fans, welcome to my second article "Mac Facts 2". Before proceeding,I have to say something, I'm not an expert mac user but i do know something about mac which could be at least a little useful for some beginners as "Macster". This article and other mac-fact articles will be based on my knowledge about mac OS's. The Os I'm using is Mac Os X 10.4.11, where the softwares installed here can also be installed in other mac os versions greater than 10.4.11 and not vice versa. In this article we will see some solutions for some little problems in mac.
Searching For Finder?
Problem: On one fine morning you wake up switch on your mac and open iTunes and start hearing to music and then you want to open a document stored in your "Documents" folder, so you move your cursor to the dock and you were supposed to click the Finder icon, but you were shocked for a moment, because the Finder icon disappeared and you can't open your any "Documents", you can only open the applications on your dock, so what'd you do? Here is the solution...
Solution: The problem is with your Finder Preference file, all you have to do it is simply delete that file, don't worry that file will be created automatically when you login next time, its a temporary file that stores your Finder information.
How To Delete:
1. GoTo Macintosh HD>Users>Your-User-Name>Library>Preferences
2. Find and delete the com.apple.finder.plist file
3. Empty Trash
4. Restart System
5. Problem Solved***
Changing Icons!
What To:
You totally love your mac look, after some days you will feel bored about the mac design, obviously. With all the same blue and gray folder icons, you will lose your artistic nature, you may even wonder how cool it would be if you can change your folder icons like in a PC, and yes! there is way to do that in a really simple way. Let me show you how...
How To:
So goto the folder which you wanted to change the icon. Click on "Get Info" icon on the toolbar or right-click that folder->Get Info. The "Get Info" window will appear.
Now Choose the icon file-> right click->Copy.
Now in the above "Boddunan Music Info" window, you see a little Blue Folder icon on the top left corner, select it, it will get high-lighted.
Goto the Finder Menu Bar->Edit->Paste.
That's how you paste your copied icon file to your folder and change its icon.
Before:
After:
Uninstalling Application In a Mac:
What To:
In windows OS to uninstall a software or any game or any programs you use control panel>Uninstall Programs route, but you cannot apply the same way in a mac os, because you know these two os are totally different, so if you want to remove or uninstall a software/program/game in a mac os you can't remove all the particular softwares system file, temporary file and some other related files, you can remove only what you delete, because of this many unwanted files of deleted programs will be left in your Macintosh HD, the smart way to remove is using an Uninstaller, by default mac os don't come with Uninstallers, you have to download them separately or buy them or create your own automated scripts to do such work. In my case i use "AppDelete" Uninstallers to remove applications, it does a good job.
How To:
All you have to do is Drag & Drop the desired application into the opened AppDelete application and click ok. This application will and can have its icon only near the Trash icon in the dock.
For example i dragged & dropped an application named HyperTankz, if i click ok it will be removed with all the related files, the files will be in the trash. In the next window you will have options to UNDO the removal. Then after that you'll have this window:
You either choose one of the options.
Well, I will see you in my next Mac-Facts article.
More Articles …
Subcategories
Web Hosting
Web Hosting is a service offered by web hosting providers to the individuals and organizations to make their websites accessible on the internet. Depending on the requirement, one can avail different types of web hosting such as shared hosting, dedicated hosting, virtual private hosting, cloud hosting etc.
Page 63 of 193