RSS

Monthly Archives: May 2009

>Transfer files direct to your friend from your browser using Files Over Miles

>

Few days back, I remember Pranav replied to one question in Yahoo Answers that how to share files with other on internet. and the asker did not want to leave any trace on the public file sharing server. Files Over Miles addresses the same problem. You can send files directly (P2P) to other user directly from your browser. The only requirement is that you should have Flash plug-in installed in your browser.

Simply browse the file and Files Over Miles generates unique URL. Share this URL with other and as soon as the recipient clicks on the URL, the transfer kicks start. 

FilesOverMiles

FilesOverMiles 1

The data transfer is fast as the data is sent using the shortest way. There are no immediate servers slowing down the process. Nothing is stored in any server and the data transfer is fully encrypted. The service works without any hassle and would be favored by the users who are more concerned about the data privacy.

 
Leave a comment

Posted by on May 30, 2009 in Uncategorized

 

>Portforward – Play online games and stream music from your PC to internet

>

Ever wanted to play online games and lo! you get a message that firewall has blocked the game from connecting to the internet. Now the next step is to allow the game in firewall’s exception list but the situation remains same. We try to restart the computer thinking that it may effect the new settings but we remain to the point from where we started.

Most of us do not know the real problem behind it and blame the firewall installed (most of the time) and software that we are using. The main reason behind the problem is not firewall installed on the computer but the security firewall bundled with the internet broadband router provided by our ISP. The next step we take is to search Google. What we find there after going through various websites and forums that we need to forward port in the router as most of the pc game need a special port to communicate to internet. But most of us do not know how and what port we need to forward. Other than using port forward for online MMOPRG games. You can use the portforward to stream music from your computer to internet. And if you want to host your website in your PC then you can also use port forwarding to make your site hosted on your computer accessible from internet. 

Port forwarding is a bit tricky but not any more as we can find loads of information regarding what port to forward and how to do it. You can get all the details on the website http://www.portforward.com/ . The website is so vast that we can find all the information that are required to make a PC Game connect to the internet and play an online multiplayer game. You can find almost all the famous games settings here.

Now no more waiting for the technician to forward port for you, just do it yourself and enjoy whole lot of programs that need port forwarding to work better.

Contributed By: Akash Khare

 
1 Comment

Posted by on May 29, 2009 in Uncategorized

 

>Services to save temp URL for reading later – “I need to Read This” and Instapaper.

>

What you do when you come across any interesting website which you want to refer back for reading? Bookmark the site, and then quite possible that you forget about the site. I was doing the same bookmarking the interesting site and finally ended up with huge bookmark list.

To solve this problem I started copying the content and sending it to my special Gmail suffix username+readthis@gmail.com . So that I can filter the mail and read the article later on. This used to be time consuming, tedious and not productive as well.

I Nees to Read This

The service “I Need to Read This” addresses this kind of problem. Add two bookmarklets in your browser and you are ready to go. What this service does is when you come across anything interesting which you want to read later, click on the bookmarkletI Need to Read This” and the link is saved in the cloud. This service has another bookmarklet button “Read An Article”. When you click on this it serves you the pages you have saved in reverse chronological order. And when you click it again, it will take to second story.

I Nees to Read This bookmarklets

The service maintains the complete list of your saved pages. You can access the list by logging in to the service. And since this service is bookmarklet based, you need install anything and it can be used from the public computer as well.

Another service worth mentioning here is “Read Later” by Instapaper. This is also a bookmarklet based service. The USP of this service is that this service generates RSS feed of the unread items, which I find quite convenient to keep track that what I have saved for future reading.

Instapaper

Another feature is that you can “star mark” the saved pages for easy filter (like Gmail). You can also access the deleted links and besides this the RSS Feed option is also there. All these combinations makes this service a killer service.

 
Leave a comment

Posted by on May 25, 2009 in Uncategorized

 

>Wipe data securely before selling or donating your computer

>

What is the biggest concern you have when you plan to sell or donate your computer. The data residing in your hard disk. If you format the disk before donating or selling the computer, think for a while. Anybody with a data recovery software can recover the juicy info from your hard drive.

Use DBAN to securely wipes out data from your computer. And it is so secure that even government agencies and corporate are using it. If you require tool for bulk data destruction, then you can also try this. The DBAN site quotes.

Darik’s Boot and Nuke (“DBAN”) is a self-contained boot disk that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for bulk or emergency data destruction.

DBAN is a means of ensuring due diligence in computer recycling, a way of preventing identity theft if you want to sell a computer, and a good way to totally clean a Microsoft Windows installation of viruses and spyware. DBAN prevents or thoroughly hinders all known techniques of hard disk forensic analysis.”

To use this tool to wipe data from your computer. Please follow the steps given below.

  1. Take backup of your data in any external media.
  2. Download DBAN and prepare the bootable media.
  3. If you want to install Windows after wiping the data, then please ensure that you have all required drivers.
  4. Now boot your system with the media in which you have burned DBAN. At prompt enter AUTONUKE and hit ENTER.
  5. Wait till you are prompted with the black screen. This mean the operation is complete.

DBAN http://d.scribd.com/ScribdViewer.swf?document_id=15694513&access_key=key-19hhilh88yiptnxqci25&page=1&version=1&viewMode=slideshow

Now you can safely handover your system without any fear. And if you want to delete files securely in Windows environment than you may use Heidi Eraser for this.

 
1 Comment

Posted by on May 21, 2009 in Uncategorized

 

>imeem.com: Last FM alternate (Better One!!!!)

>

I used to be a loyal Last FM fan and and referred many users to Last FM. I was pretty impressed by the service. It was a rude shock when few days back I received a mail from them that the service has been turned to paid subscription based. I was left with no option and then I started skimming internet for an alternate service and discovered imeem.com . I must write that the service offered is much better than Last FM.

imeemThe interface of imeem.com is neat and better than Last FM. Audio streaming is also one up, and targeted recommendations are also good. The collection of music and videos are also better. I chanced upon some outstanding African tunes which otherwise was not possible with other service.

Imeem.com player

imeem.com dashboard gives view of upcoming birthdays, edit your status or the last track you listened, you can import contacts from Gmail, Hotmail, Yahoo, AOL etc, upload your music tracks, and share your music, videos with your friends through mash up of different widgets.

The most outstanding feature which I must highlight is that you need not to sign up for the service to enjoy music. You can listen to the music without subscribing as well. And above all you can share your taste of music and your favorite song playlist by embedding the widget in your Facebook, MySpace, Blogs etc.

Please go ahead and try the service and pass this message to all disgruntled Last FM users like me.

Reblog this post [with Zemanta]
 
Leave a comment

Posted by on May 16, 2009 in Uncategorized

 

>Adware and Spyware – Fix it yourself

>

In the recent days I have noticed that more then 60% of computer users are facing issues related to spy-wares and ad-wares and Trojans. People complain that they get unwanted pop-ups while browsing even though they are using anti-virus and update them regularly. Some of them complain that they are facing slow performance of the computer even though there are few software installed on it. The main problem behind all such issues are flashy advertisements which pops up while browsing claiming free virus scan, cheap anti-virus program, sometimes the advertisement are so stubborn that they do not go easily and most of the time we have to kill them using Task Manager. Analyzing the situation I came up with a common troubleshooting procedure in such cases.

Open Folder Options in Control Panel and make window to show all hidden files and folders.

1. Click on Start Menu > Run > type "temp" without quotes and delete all the files and folder present in the window that opens (leave the files that cannot be deleted).
2.Click on Start Menu > Run > type %temp% and again delete all files and folders from this folder too.
3. Download Trojan Remover from
    http://www.simplysup.com/tremover/download.html
    Install and update it.
4. Restart the computer in Safe Mode.

For Windows XP:

Using the F8 Method:

  • Restart your computer.
  • When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
  • Select the option for Safe Mode using the arrow keys.
  • Then press enter on your keyboard to boot into Safe Mode.

For Vista follow all the steps

Using the F8 Method:

  • Restart your computer.
  • When the computer starts you will see your computer’s hardware being listed. When you see this information start to gently tap the F8 key repeatedly until you are presented with the Windows Vista Advanced Boot Options.
  • Select the Safe Mode option using the arrow keys.
  • Then press the enter key on your keyboard to boot into Vista Safe Mode.
  • When Windows starts you will be at a typical logon screen. Logon to your computer and Vista will enter Safe mode.

To restart the computer in Safe Mode, power on the computer and immediately start tapping F8 key of your keyboard. You will get a menu with option Safe Mode. Select it using arrow key of the keyboard and hit enter to boot the computer in safe mode.
5. In Safe Mode use Trojan Remover to scan any trojan present on your computer. If detected use the instruction to clean them. When the scanning is over, restart the computer back to Normal Mode.
6. Now download some good anti malware programs. For me Superantispyware Pro is one of them. You can download it from
http://www.superantispyware.com/downloadfile.html?productid=SUPERANTISPYWARE
Install the program, update it and run a complete scan of the computer. Quarantine the detected files and restart the computer.
7. Open Control Panel > Internet Options. Click Advanced Tab and Click Reset to reset the Internet Explorer to the default mode so that it becomes as good as new.
8. To avoid redirection of website from the browser:

Open "C:\windows\system32\driver\etc" folder location and rename "hosts" file. Restart the computer once again.

9. Most of the ad-wares and spy-wares add themselves to the startup of Windows and run silently in the background without any knowledge of the computer user. To remove these unwanted entries in the Windows Startup program list, one should use System Configuration Utility. To access follow the steps:

Click on Start Menu > Run > type “msconfig” without quotes and click OK.

msconfig
Here disable all unwanted startup programs that you do not want to load or do not know about any program listed there which you did not installed. If you are not confident to use msconfig command, please visit the links given below.

http://www.netsquirrel.com/msconfig/msconfig_xp.html

http://www.netsquirrel.com/msconfig/msconfig_vista.html

10. Once completing all above steps restart the computer once again and check if there is any improvement in the computer’s performance. You will find that most of the problems that you were facing are gone.

Technorati Tags: ,,,,,,,,,,,

 
Leave a comment

Posted by on May 12, 2009 in Uncategorized

 

>Bottled Water – Do we need it?

>

water-bottleI accept, this is not the usual stuff I write about. But I feel compelled to share this with you.I used to think bottled water is safe but now I have realized that I was wrong. And why I should pay the exorbitant price for the bottled water when it is not safe. Have a look at the presentation. The facts and figures will compel to think about it.

 

Water Disaster – Avoid Bottled Water

http://d.scribd.com/ScribdViewer.swf?document_id=14853553&access_key=key-2njqiza6xwvjp4ji9ob&page=1&version=1&viewMode=

We need to counteract the pervasive marketing that has caused consumers to lose faith in the faucet. In fact, more than a quarter of bottled water is just processed tap water, including top-selling Aquafina and Coca-Cola’s Kinley. Please save our planet.

 
Leave a comment

Posted by on May 2, 2009 in Uncategorized