<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-254639271055025231</atom:id><lastBuildDate>Mon, 09 Sep 2024 03:11:15 +0000</lastBuildDate><category>user query</category><category>mobile</category><category>hardware</category><category>tips</category><category>software</category><title>Computer &amp;amp; Technology</title><description></description><link>http://technosavvyspot.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>23</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-5060921102457729065</guid><pubDate>Sat, 11 Jan 2014 17:25:00 +0000</pubDate><atom:updated>2014-01-11T09:26:18.170-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hardware</category><title>How to format Dell Mini Inspiron from Recovery disk ( pen drive).</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
First of all insert the pen drive in the usb in which recovery disk ( operating system recovery is present). Then restart the system. Follow all the necessary details and click on relevent details. At last it will format the partition and install the windows. Then system will ask for restart. Restart the system and then remove the pen drive from the system. System will restart with fresh installation.&lt;/div&gt;
</description><link>http://technosavvyspot.blogspot.com/2014/01/how-to-format-dell-mini-inspiron-from.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-4908975568609692542</guid><pubDate>Mon, 30 Apr 2012 11:52:00 +0000</pubDate><atom:updated>2014-01-05T09:30:20.265-08:00</atom:updated><title>Zurker open invitation</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span class="fourteen"&gt;Zurker is better than Facebook or Google+ and we know you'll be blown away. But it's a social network, 
  which means it doesn't work if you don't have enough contacts.&lt;/span&gt;&lt;br /&gt;
&lt;span class="fourteen"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrct2dQP9OzSMCCvcOqh5dOBFh3k8oXjjXJMwtx_RVi3UXDvXH-_jpCIN-58yx-ljkA_AU9vwp6h8_JWJL-fw_SKW_nCrXcncDnxTURj6catSbWjyjo-C2ZyyNxGc8bZj1trlZTwuvuAJ4/s1600/zurker.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="250" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrct2dQP9OzSMCCvcOqh5dOBFh3k8oXjjXJMwtx_RVi3UXDvXH-_jpCIN-58yx-ljkA_AU9vwp6h8_JWJL-fw_SKW_nCrXcncDnxTURj6catSbWjyjo-C2ZyyNxGc8bZj1trlZTwuvuAJ4/s400/zurker.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span class="fourteen"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div style="text-align: center;"&gt;
&lt;span class="fourteen" style="background-color: yellow;"&gt;&amp;nbsp;&lt;b&gt;&lt;a href="http://www.zurker.com/" target="_blank"&gt;create free ZURKER account&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class="fourteen" style="background-color: #e06666;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class="fourteen" style="background-color: #e06666;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h1&gt;


Zurker - an Introduction to the Future&lt;/h1&gt;
In the beginning, nobody questioned the social networks. They were a great way of keeping in touch with friends and 
 making new ones. 

 

 Eventually, concerns started to mount, and new social network applications started popping up, promising users 
 that they would "own their data." 

 &lt;br /&gt;
At Zurker, we've taken things a bit further. You don't just own your data, &lt;i&gt;you own the network&lt;/i&gt;. Every Zurker user 
 can very easily become a co-owner (future shareholder) of Zurker. 

 &lt;br /&gt;
Why is this cool?

 &lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;


Zurker is a member-owned application. &lt;/h2&gt;
This means Zurker isn't owned by a select few venture capitalists who stand to make billions and billions. There is 
 nothing wrong with the idea of venture capitalists making billions from tech investments, but in the 
 case of a social network, the priorities get skewed. 

 

 If social networks are owned by VC's and investment banks (such as Goldman Sachs) and other investors looking 
 purely for profit, they gradually become orientated towards one thing and one thing only: making money. How do we 
 mine more data from the users? How do we monetize their every action? How do we get them addicted to paid apps which 
 improve the bottom line?

 &lt;br /&gt;
It's not a bad thing for a social network to make money, but if squeezing every last penny from the user base is the 
 abiding concern, the users aren't going to get the best possible product. 

 &lt;br /&gt;
&lt;h2&gt;


Zurker is driven by democracy. &lt;/h2&gt;
The traditional way for social networks to innovate has been top-down 
all the way. A small group of engineers 
 make key decisions about what features should be made available. 
Sometimes, brilliant innovators (such as Steve Jobs) can come up with 
 mind-blowing applications nobody knew they wanted. 

 

 But in many cases, the changes are driven by mundane things such as corporate politics, and the users are forced to adapt 
 to changes because they 
 have no choice. 

 &lt;br /&gt;
At Zurker, we believe that if our members own the project, they will enthusiastically contribute 
 ideas and feedback, allowing the Zurker development team to develop the social application most in tune with what people 
 actually want.  

 &lt;br /&gt;
&lt;h2&gt;


Zurker is owned by &lt;i&gt;you&lt;/i&gt;. &lt;/h2&gt;
There are dozens if not hundreds of social applications on the web. All of them want your time, and most of them want you to 
 help them grow by referring your friends. 
 But why should you? The only people who benefit when those apps grow are the founders and their investors. They stand to make 
 hundreds of millions of dollars each if their product takes off, so it's no wonder they keep pressuring you to help them grow. 

 

 At Zurker, you &lt;i&gt;are&lt;/i&gt; a co-owner and an investor. You can earn vShares 
 by referring your friends. The more friends you invite, the more equity you earn. Zurker becomes better, and better, as 
 more people join, increasing in value. As Zurker becomes more valuable, your stake becomes more valuable. 

 &lt;br /&gt;
Like any other social network, we ask you to refer your friends. We ask you to do some work. But we make sure you get a 
 slice of the pie in return. &amp;nbsp; 





&lt;/div&gt;
</description><link>http://technosavvyspot.blogspot.com/2012/04/zurker-open-invitation.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrct2dQP9OzSMCCvcOqh5dOBFh3k8oXjjXJMwtx_RVi3UXDvXH-_jpCIN-58yx-ljkA_AU9vwp6h8_JWJL-fw_SKW_nCrXcncDnxTURj6catSbWjyjo-C2ZyyNxGc8bZj1trlZTwuvuAJ4/s72-c/zurker.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-4060658580835616960</guid><pubDate>Wed, 09 Nov 2011 13:54:00 +0000</pubDate><atom:updated>2011-11-12T10:38:13.851-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">mobile</category><title>Upgrade Spice MI-300 To Android 2.1 Éclair</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span class="apple-converted-space"&gt;&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 10pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 10pt;"&gt;&lt;a href="http://www.dreambloggers.com/spice-introduced-cheapest-android-phone-spice-mi-300/" title="Spice Android Phone: Spice MI-300"&gt;&lt;span style="color: #006699;"&gt;Spice
Android Phone: Spice MI-300&lt;/span&gt;&lt;/a&gt;. By Default, this handset comes with
Android 1.6 Donut. But as this is the old version of Android OS, and the latest
version is Android 2.1 Eclair and you might be excited to upgrade your spice
phone to new version i.e. Android 2.1 Eclair.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; line-height: 15pt; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto;"&gt;
&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 10pt;"&gt;It is very easy to upgrade
Spice MI-300 Firmware to Android 2.1 Eclair. Please note; take backup of your
phone contents because all those will be removed after upgrade.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="note" style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; line-height: 15pt; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto;"&gt;
&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 10pt;"&gt;Follow these steps&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; line-height: 15pt; margin-bottom: 0.0001pt; margin-left: 0.5in; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -0.25in;"&gt;
&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 10pt;"&gt;1.&lt;span style="font: normal normal normal 7pt/normal 'Times New Roman';"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 10pt;"&gt;Download the software update tool from the official website of
Spice Mobile Phones. You can use the direct link of download&amp;nbsp;&lt;a href="http://www.spiceglobal.com/Document/MI-300-Eclair-Software-Updater-Tool.zip" target="_blank"&gt;Download here&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; line-height: 15pt; margin-bottom: 0.0001pt; margin-left: 0.5in; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -0.25in;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; line-height: 15pt; margin-bottom: 0.0001pt; margin-left: 0.5in; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -0.25in;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_iPaUN0EQlExagQUs_EBsJRNzmwVaTGtyYOg2gZW1OxuWiNZ9lkZNsvgmFQwMeV7hB6oo9dceJS_blLieNbqXMKAVAtFS_ImuHCLoQLxx4vIyGfvwQknXT-umYl9p1EJH4QhVFhjwjMa4/s1600/Spice-MI-300-updgrade-tool_thumb.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_iPaUN0EQlExagQUs_EBsJRNzmwVaTGtyYOg2gZW1OxuWiNZ9lkZNsvgmFQwMeV7hB6oo9dceJS_blLieNbqXMKAVAtFS_ImuHCLoQLxx4vIyGfvwQknXT-umYl9p1EJH4QhVFhjwjMa4/s320/Spice-MI-300-updgrade-tool_thumb.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 10pt;"&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;/div&gt;
&lt;div style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 10pt;"&gt;2.
Switch ON Your Mobile Phone and connect it to your pc with the help of USB
Cable&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; line-height: 15pt; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto;"&gt;
&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 10pt;"&gt;3. Run the setup file i.e.
Setup.exe, just relax. Your Device will start updating.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; line-height: 15pt; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto;"&gt;
&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 10pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcGgBHbi_N3FwW7PMSIhAcdnuk8MiDQJc0a1kA91LixUTgLuqozT8zrBAUvJ5HRlbEviIkmAqyGyYCzNm3PI4ra3F-gz_e_j8ItW5kgqma63wblVgCboPCl_sbujgRtcF6yIQyW_yeJBqc/s1600/sut.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="255" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcGgBHbi_N3FwW7PMSIhAcdnuk8MiDQJc0a1kA91LixUTgLuqozT8zrBAUvJ5HRlbEviIkmAqyGyYCzNm3PI4ra3F-gz_e_j8ItW5kgqma63wblVgCboPCl_sbujgRtcF6yIQyW_yeJBqc/s320/sut.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; line-height: 15pt; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto;"&gt;
&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 10pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; line-height: 15pt; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto;"&gt;
&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 10pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; line-height: 15pt; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto;"&gt;
&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 10pt;"&gt;4. Your phone will look like this during updation. You need not do anything during installation.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; line-height: 15pt; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto;"&gt;
&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 10pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiz9NR0Vh429KPvzgBPxZH6tRRONLdZiVYaV0IXG3bsgl7h21hG6owh1w0pCk42TRRCudUezzmpjag_AV4wCT4z8KCs9y4VZ7GCPprviWgDAqaYVhpgmYzan0TrAqfAP0pHYjCQ3sPllhk6/s1600/DSC02694.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiz9NR0Vh429KPvzgBPxZH6tRRONLdZiVYaV0IXG3bsgl7h21hG6owh1w0pCk42TRRCudUezzmpjag_AV4wCT4z8KCs9y4VZ7GCPprviWgDAqaYVhpgmYzan0TrAqfAP0pHYjCQ3sPllhk6/s320/DSC02694.JPG" width="240" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; line-height: 15pt; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto;"&gt;
&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 10pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; line-height: 15pt; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto;"&gt;
&lt;span class="Apple-style-span" style="color: #333333; font-family: Arial, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; line-height: 15pt; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto;"&gt;
&lt;span class="Apple-style-span" style="color: #333333; font-family: Arial, sans-serif; font-size: 13px;"&gt;Within few minutes your phone will be furnished with the whole new operating system, Android 2.1 Eclair.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 10pt;"&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitxPDZTsVaWWA9zZRKD1Vq17IU-auEIp9yhcdl7Cw0oyjS95MJtIN_oHeBZNk5p6mX9HCO2_UPfob3H_2wxHRWQ4OuSXkuhPvaqWw2Vpas4lD2TYTCZ3zJYGzXhrkU2eM_sZrkNo5w9DS3/s1600/sotool.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="255" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitxPDZTsVaWWA9zZRKD1Vq17IU-auEIp9yhcdl7Cw0oyjS95MJtIN_oHeBZNk5p6mX9HCO2_UPfob3H_2wxHRWQ4OuSXkuhPvaqWw2Vpas4lD2TYTCZ3zJYGzXhrkU2eM_sZrkNo5w9DS3/s320/sotool.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 10pt;"&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 10pt;"&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span class="Apple-style-span" style="color: #333333; font-family: Arial, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;/div&gt;
&lt;div style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span class="Apple-style-span" style="color: #333333; font-family: Arial, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;


&lt;a href="http://click.linksynergy.com/fs-bin/click?id=E1TEnAPzT0c&amp;offerid=203567.10000019&amp;type=4&amp;subid=0"&gt;&lt;IMG border=0 alt="Flight Banner 468x60" src="http://www.tripmama.com/traveldeals/banners/flight-hotel-banners/images/flight/468x60.gif"&gt;&lt;/a&gt;&lt;IMG border=0 width=1 height=1 alt=banner src="http://ad.linksynergy.com/fs-bin/show?id=E1TEnAPzT0c&amp;bids=203567.10000019&amp;type=4&amp;subid=0"&gt;





&lt;br /&gt;

&lt;/div&gt;</description><link>http://technosavvyspot.blogspot.com/2011/11/upgrade-spice-mi-300-to-android-21.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_iPaUN0EQlExagQUs_EBsJRNzmwVaTGtyYOg2gZW1OxuWiNZ9lkZNsvgmFQwMeV7hB6oo9dceJS_blLieNbqXMKAVAtFS_ImuHCLoQLxx4vIyGfvwQknXT-umYl9p1EJH4QhVFhjwjMa4/s72-c/Spice-MI-300-updgrade-tool_thumb.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-6851034356271485197</guid><pubDate>Wed, 09 Nov 2011 13:21:00 +0000</pubDate><atom:updated>2011-11-10T02:33:32.309-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hardware</category><title>Phoenix Bios Setup Utility</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii2xmadzuZDmxX607F-hNx4pgG5_HuldVo8ezU0RR6XGFljzyVZlwHW4l9mxQGhu7DPELmuiHYbaZSiBA9RCpRPemtk2MeS5xnPKJFmW-A7wvBup6LOqeumfC20QInYZ4AJLvaip8fNBPD/s1600/changebootordersequence-thumb.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="238" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii2xmadzuZDmxX607F-hNx4pgG5_HuldVo8ezU0RR6XGFljzyVZlwHW4l9mxQGhu7DPELmuiHYbaZSiBA9RCpRPemtk2MeS5xnPKJFmW-A7wvBup6LOqeumfC20QInYZ4AJLvaip8fNBPD/s320/changebootordersequence-thumb.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;b&gt;For changing boot device priority:&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
The instructions for changing the boot order are in the sidebar, but usually it requires pressing the + or – buttons to move items up and down in the order list. The first item in the list is what will be scanned first when booting. If boot media is not found, it will try the second device and so on.Finally, go to Exit and make sure you choose Yes to the Save configuration changes and exit now?&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdqMAUGwoNh3WANoNe3fhjiUD1zEnUtG4kMbZw9c2cgJxZQ4yF6pUa3zU6c2s2O7ohrocpT-jcHqF0pa25-zwrXZsW2lkDJN061IvtBGTcbWI8tvFvLNaCd19v3v3Ux4E_961yG7MQ0zhd/s1600/biosbootorder-thumb.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="238" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdqMAUGwoNh3WANoNe3fhjiUD1zEnUtG4kMbZw9c2cgJxZQ4yF6pUa3zU6c2s2O7ohrocpT-jcHqF0pa25-zwrXZsW2lkDJN061IvtBGTcbWI8tvFvLNaCd19v3v3Ux4E_961yG7MQ0zhd/s320/biosbootorder-thumb.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;/div&gt;
&lt;div class="" style="clear: both;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="" style="clear: both;"&gt;
That’s pretty much it! If you have any questions or can’t get into the BIOS on your computer, post a comment here and I&amp;nbsp;will try to help! Enjoy!&lt;/div&gt;
&lt;div style="margin-left: 1em; margin-right: 1em; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;

&lt;iframe src="http://origin-img.shaadi.com/shaadi-rewards/get-banner.php?ptnr=kl8bs&amp;banner_type=buttons&amp;banner_size=468x60&amp;ad_type=iframe" width="468" height="60" scrolling="no" frameborder="0" marginwidth="0" marginheight="0"&gt;&lt;/iframe&gt;




&lt;/div&gt;</description><link>http://technosavvyspot.blogspot.com/2011/11/phoenix-bios-setup-utility.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii2xmadzuZDmxX607F-hNx4pgG5_HuldVo8ezU0RR6XGFljzyVZlwHW4l9mxQGhu7DPELmuiHYbaZSiBA9RCpRPemtk2MeS5xnPKJFmW-A7wvBup6LOqeumfC20QInYZ4AJLvaip8fNBPD/s72-c/changebootordersequence-thumb.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-1323351754582988212</guid><pubDate>Tue, 08 Nov 2011 16:28:00 +0000</pubDate><atom:updated>2011-11-08T08:34:58.637-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">mobile</category><title>Near Field Communication</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
In the realm of new technologies, near field communication (NFC) is not a new or sexy concept, but it does have clear  potential and practical uses. This is why it’s been holding the attention of a slew of big-name companies for a long time. Nokia, Sony, and Royal Philips Electronics founded the NFC Forum in 2004 in order to promote the short-range wireless connectivity technology. Samsung, Motorola, Microsoft and more than 140 other organizations all joined the party shortly after.&lt;br /&gt;
&lt;br /&gt;
NFC allows a device, usually a mobile phone, to collect data from another device or NFC tag at close range. In many ways, it’s like a contactless payment card that is integrated into a phone. In other ways, it’s similar to Bluetooth, except that instead of programming two devices to work together, they can simply touch to establish a connection.&lt;br /&gt;
A year after Nokia released the first commercial version of an NFC-enabled phone in 2007, the NFC forum instituted an annual global competition to award the best ideas for applications of NFC, and soon after, trials of NFC products started taking place everywhere from Malaysia to Germany. More than 100 NFC pilot projects have now been undertaken all over the world, and like any technology, NFC has taken some time to gain traction, but it’s on track to go mainstream soon.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is NFC?&lt;br /&gt;
&lt;br /&gt;
Near Field Communication (NFC) technology makes life easier and more convenient for consumers around the world by making  it simpler to make transactions, exchange digital content, and connect electronic devices with a touch.&lt;br /&gt;
&lt;br /&gt;
A standards-based connectivity technology, NFC harmonizes today's diverse contactless technologies, enabling current and future solutions in areas such as:&lt;br /&gt;
&lt;br /&gt;
• Access control&lt;br /&gt;
• Consumer electronics&lt;br /&gt;
• Healthcare&lt;br /&gt;
• Information collection and exchange&lt;br /&gt;
• Loyalty and coupons&lt;br /&gt;
• Payments&lt;br /&gt;
• Transport&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Key Benefits of NFC&lt;br /&gt;
&lt;br /&gt;
NFC provides a range of benefits to consumers and businesses, such as:&lt;br /&gt;
&lt;br /&gt;
1.Intuitive: NFC interactions require no more than a simple touch&lt;br /&gt;
2.Versatile: NFC is ideally suited to the broadest range of industries, environments, and uses&lt;br /&gt;
3.Open and standards-based: The underlying layers of NFC technology follow universally implemented ISO, ECMA, and ETSI  standards&lt;br /&gt;
4.Technology-enabling: NFC facilitates fast and simple setup of wireless technologies, such as Bluetooth, Wi-Fi, etc.)&lt;br /&gt;
5.Inherently secure: NFC transmissions are short range (from a touch to a few centimeters)&lt;br /&gt;
6.Interoperable: NFC works with existing contactless card technologies&lt;br /&gt;
7.Security-ready: NFC has built-in capabilities to support secure applications&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are six ways that NFC could have the most impact:&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUe1MOfSxSIRoNRvHVWIRUCYNWih_uIWkQycShgLywzwhyphenhyphenuo4pF1wbRYfDG4qC4i1KtS1q2k5dQPe7rw3rlMRC-UjB95VnYU5PbsUeCKdPX1KF57hbPdQ2ncBlWEhMVRoV7-vWvn51Wihz/s1600/img.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="186" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUe1MOfSxSIRoNRvHVWIRUCYNWih_uIWkQycShgLywzwhyphenhyphenuo4pF1wbRYfDG4qC4i1KtS1q2k5dQPe7rw3rlMRC-UjB95VnYU5PbsUeCKdPX1KF57hbPdQ2ncBlWEhMVRoV7-vWvn51Wihz/s400/img.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;1. Contactless payment&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;Unlike
many other wireless technologies, &lt;span style="color: #0070c0;"&gt;NFC has a short
range of about 1.5 inches&lt;/span&gt;. This makes it a good choice for secure transactions,
such as contactless credit card payments. MasterCard and Visa are both members
of the NFC Forum, and both companies have been involved in pilot programs that
use NFC-enabled phones as a flash payment option. Phones could “tap and go”
using infrastructure already in place for credit card systems such as MasterCard’s
PayPass program or Visa’s payWave.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;2. Transportation&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;NFC
works with most contactless smart cards and readers, meaning it could easily be
integrated into the public transit payment systems in cities that already use a
smart card swipe. In 2008, German rail operator Deutsche Bahn launched an NFC-ticketing
pilot program in which 200 travelers touched their phones to an NFC tag when they
boarded the train and then to another when they got off. The fare was
calculated and added to their monthly bill. In January 2010, the successful program
was expanded to an additional 3,000 travelers. Madrid plans to start a similar pilot
program with its bus system in 2010.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;3. Health Care&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;Not
only can NFC tags provide medical professionals with information about what
treatments a patient should receive, but they can also keep track of when &amp;nbsp;nurses and doctors have checked &amp;nbsp;in with that patient and when. Each time the
tag is scanned, the information about who scanned it and when can be
transferred to a database. In addition to improving treatment, NFC tags also
have potential in the research realm.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;A
winner of last year’s NFC Forum’s 5,000 Euro prize was a program that helps
track patients in low resource areas, and is currently being used in a
pneumonia study of young children in Pakistan. Each child is given a bracelet
with an RFID tag on it. The tag is scanned every time the child visits a
participating health care organization. The clinical and laboratory data
associated with that patient is collected and posted to a secure server in
real-time.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;4. Ease of Use&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;If
NFC-enabled phones become prevalent, you’ll likely be able to initiate a
two-player game by touching your phones together. You’ll be able to link a
headset to your phone or print a photo just by touching your device to a
printer. A second-place winner in the 2009 NFC Forum competition developed a
touch-dial system for people who have trouble making phone calls. The user is
able to tap a photo of the person he wants to call. The embedded NFC tag in the
photo transmits the proper number to the phone automatically.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;5. Smart Objects&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;An
NFC tag often contains information like a phone number or URL. One of the
largest series of experiments that uses phones to pick up information from
tagged locations is SmartTouch, a project funded under the European ITEA
research program between 2006 and 2008. Most of the trials took place in Oulu,
Finland, where the city installed about 1,500 “infotags” — in buses, at bus
stops, the theater, a restaurant, and a pub — that could be read with a mobile
phone. For instance, theater patrons could not only use their mobile phones as
tickets, or to order refreshments, but they could also scan tagged posters for
more information about plays.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;For
another project, infotags were installed in schools. Students could get their
individual daily schedule, &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;announcements,
and information about homework by waving their phones past the tags. A trial
held in one pub allowed customers to tap cards with their NFC-enabled phones
for more information about products.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;NFC
may have similar applications as bar codes do now. You can put one on a poster
and let pedestrians scan it on their phones for more information. But being
able to add more information to any object by integrating a tag has led to some
interesting applications that go far beyond billboards. A company called
Objecs, for instance, sells an NFC tablet for gravestones. Touching an
NFC-enabled phone to the Personal Rosetta Stone provides additional information
about the deceased.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;b&gt;&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;6. Social Media&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;Before
Foursquare took off, a German company called Servtag was working towards a
similar concept for NFC-enabled phones called Friendticker. The company applied
more than 250 NFC-tag stickers at various locations in Berlin that users would
swipe their phones past in order to alert their friends that they were “checked
in” at that location.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;While
Foursquare may have stolen the thunder for location-based networking, there are
still plenty of social media applications for NFC in the works. Last year, a
German university (Technische Universität München) submitted a prototype to the
NFC Forum competition that integrated with Facebook. The application,
NFriendConnector, allowed people who met in a physical space to exchange
profile data through their phones. Their respective statuses would
automatically be updated (for example, “I just met so and so”) and they could
choose to include their location (“I just met so and so at this bar”). Instead
of stalking a new acquaintance’s profile after a night out, this application
provides an option to run a matching method based on variables the user
provides (such as interest, dislikes, and hobbies) while still chatting with
them in the bar.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;b&gt;&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;NFC simplifies and
expands social networking options:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;u&gt;File Sharing:&lt;/u&gt; Tap one NFC device to
another to instantly share a contact, photo, song, application, video, or
website link.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;u&gt;Electronic business card:&lt;/u&gt; Tap one
NFC device to another to instantly share electronic business cards or resumes.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;u&gt;Electronic money:&lt;/u&gt; To pay a friend,
you could tap the devices and enter the amount of the payment.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;u&gt;Mobile gaming:&lt;/u&gt; Tap one NFC device to
another to enter a multiplayer game.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;u&gt;Friend-to-friend:&lt;/u&gt; You could touch
NFC devices together to Facebook friend each other or share a resume or to "check-in"
at a location.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;b&gt;&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;Bluetooth and WiFi
Connections&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;NFC
can be used to initiate higher speed wireless connections for expanded content
sharing.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;u&gt;Bluetooth:&lt;/u&gt; Instant Bluetooth Pairing
can save searching, waiting, and entering codes. Touch the NFC devices together
for instant pairing.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;u&gt;WiFi&lt;/u&gt;: Instant WiFi Configuration can
configure a device to a WiFi network automatically. Tap an NFC device to an NFC
enabled router.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;b&gt;&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;&amp;nbsp;eCommerce&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;NFC
expands eCommerce opportunities, increases transaction speed and accuracy,
while reducing staffing requirements. A Personal identification number (PIN) is
usually only required for payments over $100 (in Australia) and £15 (in UK).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;&amp;nbsp;&lt;u&gt;Mobile payment:&lt;/u&gt; An NFC device may make
a payment like a credit card by touching a payment terminal at checkout or a
vending machine when a PIN is entered.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;u&gt;PayPal:&lt;/u&gt; PayPal may start a
commercial NFC service in the second half of 2011.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Google Wallet is an Android app that stores
virtual versions of your credit cards for use at checkout when a PIN is used.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;u&gt;Ticketing:&lt;/u&gt; Tap an NFC device to
purchase rail, metro, airline, movie, concert, or event tickets. A PIN is
required.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;u&gt;Boarding pass:&lt;/u&gt; A NFC device may act
as a boarding pass, reducing check-in delays and staffing requirements.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;u&gt;Point of Sale:&lt;/u&gt; Tap an SmartPoster
tag to see information, listen to an audio clip, watch a video, or see a movie
trailer.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;u&gt;Coupons:&lt;/u&gt; Tapping an NFC tag on a
retail display or SmartPoster may give the user a coupon for the product.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Times New Roman', serif; font-size: 10pt; line-height: 115%;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;u&gt;Tour guide&lt;/u&gt;: Tap a passive NFC tag
for information or an audio or video presentation at a museum, monument, or
retail display (much like a QR Code).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;




&lt;a href="http://www.fropper.com/dating-member/index.php?register=Y&amp;ptnr=mv1hb"&gt;&lt;img src="http://www.fropper.com/partners/get-banner.php?banner_type=banners-buttons&amp;banner_size=468x60" border="0"&gt;&lt;/a&gt;






&lt;/div&gt;</description><link>http://technosavvyspot.blogspot.com/2011/11/near-field-communication.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUe1MOfSxSIRoNRvHVWIRUCYNWih_uIWkQycShgLywzwhyphenhyphenuo4pF1wbRYfDG4qC4i1KtS1q2k5dQPe7rw3rlMRC-UjB95VnYU5PbsUeCKdPX1KF57hbPdQ2ncBlWEhMVRoV7-vWvn51Wihz/s72-c/img.jpg" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-4345088209844287395</guid><pubDate>Sun, 06 Nov 2011 15:08:00 +0000</pubDate><atom:updated>2011-11-06T07:28:23.657-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">mobile</category><title>Mobile Phones Buying Guide</title><description>&lt;div&gt;&lt;b&gt;&lt;span class="Apple-style-span"&gt;Features to Consider&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;When shopping for a phone, you can do some simple hands-on tests in the store to make sure the phone has everything you need.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Call quality&lt;/b&gt;: What good is a phone if it can't make calls? Some of the most simple, bare-bones "feature" phones offer the best call quality--and on the flip side, some fancy smartphones have dismal calling. When evaluating phones, be sure to make a few test calls. In PCWorld's hands-on tests, we generally make a few calls in a quiet room and a few calls in a noisy environment. You might not be able to replicate such tests indoors, but try your best. Take note of static, tinny voices, or any other interference. Ask the person on the other end of the line if they can hear a disruptive amount of background noise.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Design:&lt;/b&gt; Your choices range from flip-open clamshell-style phones to candy bar-style phones to slider-style phones with full-QWERTY keyboards. Whichever type of phone you select, check its ergonomics. Is it comfortable to hold against your ear, and can you hear callers without constant adjustment? Can you use the phone with one hand? Consider hands-free use: Can you comfortably hold the phone to your ear by scrunching your neck and shoulder?&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Operating system&lt;/b&gt;: If you're looking to do more than make calls and send text messages with your phone, consider the platform on which it runs. The mobile operating system you choose will greatly affect the capabilities of your phone. The most popular platforms are Google's Android OS (found on multiple devices), iOS (found only on the iPhone) and BlackBerry OS (found on BlackBerrys of various designs). Each has its advantages and disadvantages, and you should definitely familiarize yourself with all of the platforms before settling on one. Other platforms include Symbian (found on most Nokia smartphones), Windows Phone 7 and Samsung's very-own Bada.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Display&lt;/b&gt;: If you intend to send and receive text messages, surf the Web, or use the phone's organizer, make sure the screen is up to snuff. Is it big enough for you to take full advantage of the phone's features? If you're going to surf the Web or edit office documents on your phone, a screen that measures less than 2.7 inches diagonally will feel very cramped.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The screen's contrast and backlight are also important. The phones we've seen show marked differences in viewing quality. If your phone allows you to adjust such settings, you can make text and graphics easily viewable--even in bright places.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Consider the screen's resolution, too. The higher the resolution, the better the screen will look--an important factor if you plan to use your phone to watch videos or view photos.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;3G support and availability:&lt;/b&gt; Although a lot of buzz surrounds the next generation of wireless networks, 3G has finally seen the light of day in India. 3G's faster download speeds significantly improve streaming video and allow features such as videoconferencing and network gaming. All major telecom providers offer 3G services in most Indian cities today and therefore 3G compatibility is important for a new phone. &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Cameras:&lt;/b&gt; If you intend to take a lot of photos with your phone, you'll definitely want to pay attention to the camera specs. For mid- to high-level smartphones, 5 megapixels is now pretty much the standard. Some phones ship with 8- or 12-megapixel cameras, but a higher megapixel count doesn't necessarily mean a better camera. Verify that the phone you're interested in has a flash--dual-LED or Xenon flashes work the best--or else you won't be able to take any pictures indoors or at night without their looking like blurry messes. Try to take a few pictures in the store to get a good idea of the camera's photo quality.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Most cell phone cameras also have video-capture capabilities; some high-end phones can even capture high-definition 720p or 1080p video. If video is your thing, make sure that the OS provides an easy way to upload your videos to Facebook or YouTube.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://click.linksynergy.com/fs-bin/click?id=E1TEnAPzT0c&amp;offerid=239191.21&amp;type=4&amp;subid=0"&gt;&lt;IMG border=0 alt=banner src="http://ad.linksynergy.com/fs-bin/show?id=E1TEnAPzT0c&amp;bids=239191.21&amp;type=4&amp;subid=0"&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://technosavvyspot.blogspot.com/2011/11/mobile-phones-buying-guide.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-7844204930660433894</guid><pubDate>Sat, 05 Nov 2011 16:52:00 +0000</pubDate><atom:updated>2011-11-06T07:42:29.066-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">mobile</category><title>Android Icecream Sandwich</title><description>Phones and tablets loaded with the Android 4.0 operating system start arriving in stores soon, but when will existing phones get the update and which models will be left out in the cold? Here's a rundown of the devices expected to get Google's Ice Cream Sandwich mobile OS first.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(51, 51, 255);"&gt;Galaxy Nexus&lt;/span&gt;&lt;br /&gt;The newest "Google phone" is expected sometime soon from Samsung and is the only new phone known for sure that will come pre-loaded with Ice Cream Sandwich. Verizon is currently taking emails from those that want to be the first to get their hands on the new Android paired with the curved Galaxy Nexus with its 1.2 Ghz processor, NFC chip and 1080p HD video capability. A leaked screenshot purported to be from Verizon seems to show a planned Black Friday launch for the phone.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(51, 102, 255);"&gt;Nexus S&lt;/span&gt;&lt;br /&gt;Google has confirmed it's working on an Ice Cream Sandwich update for the Nexus S. But that is apparently as far back as the update will go on the Google and Nexus line. There will be no ICS for the Nexus One or G1. If you don't feel like waiting for Google to roll the new Android out to your Nexus S, my colleague Sarah Mitroff found one way to get it now.&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(51, 102, 255); font-weight: bold;"&gt;LG Optimus 2X&lt;/span&gt;&lt;br /&gt;LG confirmed via its Facebook page that it is "in the process of planning the ICS OS update for the LG Optimus 2X as well as other LG high-end smartphones." No word on what those other high-end phones might be, but my bet is we'll see something new from LG with ICS in the next few months.&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(102, 102, 204); font-weight: bold;"&gt;Motorola&lt;/span&gt;&lt;br /&gt;Motorola says it will be upgrading the Droid Razr, Xoom, and Droid Bionic to Ice Cream Sandwich. The exact timing isn't clear, but the company has indicated that it will be no sooner than six weeks after Google's official release of the update.&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(51, 102, 255); font-weight: bold;"&gt;Sony Xperia phones&lt;/span&gt;&lt;br /&gt;Sony hasn't released many details, but the Dutch division of Sony Ericsson confirms via Facebook that Xperia phones will get Ice Cream Sandwich. There's no indication of when that might happen.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://click.linksynergy.com/fs-bin/click?id=E1TEnAPzT0c&amp;offerid=193630.10000018&amp;type=4&amp;subid=0"&gt;&lt;IMG border=0 alt="Banner " src="http://www.healthtohappiness.com/linkshare/banners/EN_OWD_468x60_Linkshare.gif"&gt;&lt;/a&gt;&lt;IMG border=0 width=1 height=1 alt=banner src="http://ad.linksynergy.com/fs-bin/show?id=E1TEnAPzT0c&amp;bids=193630.10000018&amp;type=4&amp;subid=0"&gt;</description><link>http://technosavvyspot.blogspot.com/2011/11/android-icecream-sandwich.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-7538209874652015149</guid><pubDate>Tue, 29 Apr 2008 18:01:00 +0000</pubDate><atom:updated>2011-11-06T07:43:50.146-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">user query</category><title>If prt scr not working on laptop:</title><description>You press and hold the [Fn] key then hit the [prt sc] key once, after which you paste the image into a paint document or in word document etc... by clicking CTRL+V.&lt;br /&gt; And if you just want to grab the active window, just press and hold, [ctrl]+[FN] and tap [prt sc].&lt;br /&gt;&lt;br /&gt;&lt;a href="http://click.linksynergy.com/fs-bin/click?id=E1TEnAPzT0c&amp;offerid=239191.21&amp;type=4&amp;subid=0"&gt;&lt;IMG border=0 alt=banner src="http://ad.linksynergy.com/fs-bin/show?id=E1TEnAPzT0c&amp;bids=239191.21&amp;type=4&amp;subid=0"&gt;&lt;/a&gt;</description><link>http://technosavvyspot.blogspot.com/2008/04/if-prt-scr-not-working-on-laptop.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-9185753356417878242</guid><pubDate>Sat, 26 Apr 2008 12:42:00 +0000</pubDate><atom:updated>2011-11-06T07:52:30.925-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">user query</category><title>How to enable Task Manager?</title><description>Click Start goto Run, type gpedit.msc and click OK. Navigate to this branch:&lt;br /&gt;User Configuration / Administrative Templates / System / Ctrl+Alt+Delete Options / Remove Task Manager&lt;br /&gt;Double-click the Remove Task Manager option. Set the policy to Not Configured&lt;br /&gt;&lt;br /&gt;Use regedit to open the Registry Editor and locate the following key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System.Find the DWORD value named Disable TaskMgr and set it to 0 or delete it altogether&lt;br /&gt;&lt;br /&gt;This will make the Task Manager available again, although you might need to log off for the changes to take effect.&lt;br /&gt;&lt;br /&gt;This same process can be used to disable the Task Manager, but you might have to create the registry key System under the Policies key. After creating the System key, create a new REG_DWORD (DWORD value) named Disable TaskMgr and set the data value to 1.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://click.linksynergy.com/fs-bin/click?id=E1TEnAPzT0c&amp;offerid=230265.10&amp;type=4&amp;subid=0"&gt;&lt;IMG border=0 alt=banner src="http://ad.linksynergy.com/fs-bin/show?id=E1TEnAPzT0c&amp;bids=230265.10&amp;type=4&amp;subid=0"&gt;&lt;/a&gt;</description><link>http://technosavvyspot.blogspot.com/2008/04/task-manager-disabled.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-7113691726727185094</guid><pubDate>Tue, 22 Apr 2008 12:04:00 +0000</pubDate><atom:updated>2011-11-06T07:59:28.735-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">user query</category><title>LAN is not working!!!!!!!</title><description>If LAN is not working there may be few reasons behind it.&lt;br /&gt;&lt;br /&gt;First check whether your Network adapter is working properly or not.&lt;br /&gt;&lt;br /&gt;Right click on My computer Icon Then properties then hardware then device manager then see for network adapters within that see whether ur network adapter is working or not.if it is disabled,enable it.&lt;br /&gt;&lt;br /&gt;Then install the driver for ur network adapter which is present on your laptop's provider site.&lt;br /&gt;&lt;br /&gt;Link:&lt;br /&gt;&lt;br /&gt;&lt;a href="http://h10025.www1.hp.com/ewfrf/wc/softwareList?os=228&amp;amp;lc=en&amp;amp;cc=in&amp;amp;dlc=en&amp;amp;product=3446907&amp;amp;lang=en"&gt;http://h10025.www1.hp.com/ewfrf/wc/softwareList?os=228&amp;amp;lc=en&amp;amp;cc=in&amp;amp;dlc=en&amp;amp;product=3446907&amp;amp;lang=en&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Under Driver - Network download your driver and install it.Restart your pc and check whether LAN is working or not.&lt;br /&gt;If it not works for you then reply here.I'l try to give another solution to your problem.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://click.linksynergy.com/fs-bin/click?id=E1TEnAPzT0c&amp;offerid=230598.3&amp;type=4&amp;subid=0"&gt;&lt;IMG border=0 alt="BTS 2011_468x60" src="http://images.highspeedbackbone.net/affiliate/banners/bts_468x60cc.jpg"&gt;&lt;/a&gt;&lt;IMG border=0 width=1 height=1 alt=banner src="http://ad.linksynergy.com/fs-bin/show?id=E1TEnAPzT0c&amp;bids=230598.3&amp;type=4&amp;subid=0"&gt;</description><link>http://technosavvyspot.blogspot.com/2008/04/lan-is-not-working.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-6790141679806870710</guid><pubDate>Thu, 10 Jan 2008 15:39:00 +0000</pubDate><atom:updated>2011-11-08T04:54:50.088-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">user query</category><title>which antivirus and how to configure, to protect my lan including all the 8 comps attached to it?</title><description>ZoneAlarm Anti-Spyware will work on any LAN connection with firewalls and proxies. Typically, no additional configuration is needed for ZoneAlarm to work on a LAN.&lt;br /&gt;Making your computer visible on your local networkIf you cannot see the other computers on your local network, or they cannot see you, it is possible that ZoneAlarm Anti-Spyware is blocking the NetBIOS traffic necessary for Windows network visibility. To make your computer visible to the others on your local network:&lt;br /&gt;Add the network subnet (or, in a small network, the IP address of each computer with which you're sharing the network) to your Trusted Zone.&lt;br /&gt;Set the Trusted Zone security level to Medium, and the Internet Zone security level to High.&lt;br /&gt;This configuration allows trusted computers to access your shared files, but blocks all other machines from accessing them. Note: ZoneAlarm Anti-Spyware will detect your network automatically and display the New Network alert. You can use the alert itself to add your network subnet to the Trusted Zone. Sharing files and printers across a local networkTo configure ZoneAlarm Anti-Spyware for secure sharing:&lt;br /&gt;Add the network subnet (or, in a small network, the IP address of each computer with which you're sharing the network) to your Trusted Zone.&lt;br /&gt;Set the Trusted Zone security level to Medium. This setting allows trusted computers to access your shared files.&lt;br /&gt;Set Internet Zone security level to High. This setting makes your computer invisible to non-trusted machines.&lt;br /&gt;Note: ZoneAlarm Anti-Spyware will detect your network automatically and display the New Network alert. You can use the alert itself to add your network subnet to the Trusted Zone. Internet Connection Sharing (ICS)If you are using Windows' Internet Connection Sharing (ICS) option, or a third-party connection sharing program, you can protect all of the computers that share the connection from inbound threats by installing ZoneAlarm Anti-Spyware on the "gateway" machine only. However, to receive outbound (Program Control) protection, or to see alerts on the client machines, you must have ZoneAlarm Anti-Spyware installed on each client machine as well. Tip: Before you configure ZoneAlarm Anti-Spyware, use your ICS software to set up the gateway and client relationships . If you use hardware such as a server or router, rather than a host PC, to perform Internet connection sharing, do not follow the steps below. On the ICS gateway machine:&lt;br /&gt;Go to Main tab of the Firewall panel.&lt;br /&gt;Click Advanced.&lt;br /&gt;Under Internet Connection Sharing, select This computer is an ICS gateway.&lt;br /&gt;In the combination box, select or type the IP address of the gateway machine.&lt;br /&gt;Select Suppress alerts locally if forwarded to clients if you do not want to see alerts that are forwarded to a client.&lt;br /&gt;Note: That if you do not install ZoneAlarm Anti-Spyware on the client machines, all alerts will be displayed on the gateway. For best security, make sure the security level for the Internet Zone is set to High. Make sure outgoing DNS and DHCP are allowed for the Internet Zone at High security. On the ICS client machines:&lt;br /&gt;Go to Main tab of the Firewall panel.&lt;br /&gt;Click Advanced.&lt;br /&gt;Under Internet Connection Sharing, select This computer is a client of an ICS gateway running ZA Pro.&lt;br /&gt;In the combination box, select or type the IP address of the gateway machine.&lt;br /&gt;Select Forward alerts from gateway to this computer if you want alerts occurring on the gateway machine to be displayed on this client.&lt;br /&gt;&lt;br /&gt;If Connecting through a proxy server&lt;br /&gt;&lt;br /&gt;To enable your computer to connect to the Internet through a proxy server, add the proxy to your Trusted Zone&lt;br /&gt;&lt;br /&gt;But if you want all three in one then use ZoneAlarm Internet Security Suite, which integrates anti-virus, anti-spyware and a firewall.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.fropper.com/dating-member/index.php?register=Y&amp;ptnr=mv1hb"&gt;&lt;img src="http://www.fropper.com/partners/get-banner.php?banner_type=banners-buttons&amp;banner_size=468x60" border="0"&gt;&lt;/a&gt;</description><link>http://technosavvyspot.blogspot.com/2008/01/which-antivirus-and-how-to-configure-to.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-7721270596242151036</guid><pubDate>Thu, 10 Jan 2008 14:34:00 +0000</pubDate><atom:updated>2008-01-10T06:43:05.466-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">user query</category><title>To configure WPA for powerful encryption :</title><description>Configuring WPA wireless security on the router&lt;br /&gt;&lt;br /&gt;First, let's log on to the router.&lt;br /&gt;Open your internet browser and type http://192.168.1.1 in the address bar. This is the default IP address of the browser.&lt;br /&gt;In the login box that appears type 'admin' (without quotes) in both fields. 'admin' is the default username and password.&lt;br /&gt;Write down the SSID&lt;br /&gt;In the Wireless &gt; Basic Wireless Settings menu you will see the Service Set Identifier or SSID. The SSID differentiates one wireless network from another. It is the 'network name'. Write it down, or copy paste it to a text file. You will need it later. You can first set your own SSID if you like.&lt;br /&gt;In the Linksys WRT54G router you will find the wireless security options under Wireless &gt; Wireless Security. This page allows you to set wireless encryption options.&lt;br /&gt;&lt;br /&gt;Set the WPA alghoritm to TKIP.&lt;br /&gt;Type a key in the WPA Shared Key field with a length between 8 and 32 characters. Remember that a longer key is more secure. Besides that, a key that is made up of random characters is harder to crack than a key that contains real words, because real words can be guessed far easier.&lt;br /&gt;Write down the key or copy-paste to a text file, because you will need it later to connect to the network.&lt;br /&gt;Click Save Settings&lt;br /&gt;Your computer will now be disconnected from the router. You may see a 'page not found' warning or some other error message in your webbrowser. Your router now demands that computers that connect to it use WPA encryption and the correct WPA key. In other words: you have succesfully secured your network. Now let's configure your computer to reconnect to the router using the right WPA key.&lt;br /&gt;Configuring WPA security in Windows XP SP2&lt;br /&gt;I will show you how to configure WPA using Windows' built-in wireless network options. Most wireless network card manufacturers create have developed their own configuration software that you can use to manage wireless connections and security. You can use whichever software you like best. The settings remain the same. Please note that you will need a computer with a properly installed wireless network card to continue.&lt;br /&gt;&lt;br /&gt;1.In Windows XP go to Start &gt; Settings &gt; Network Connections.&lt;br /&gt;2.Doubleclick the wireless network connection. The wireless network connections window will appear. This window shows you the wireless networks that are within range.&lt;br /&gt;3.If all is right than you should see your wireless network in the list, since your router is advertising your network's SSID to the outside world. In this example I used the word 'kazam' as the SSID.&lt;br /&gt;4.Click change advanced settings in the bottom-left corner of the window. A new window will appear. Select the wireless networks tab.&lt;br /&gt;5.Select your network's SSID from the list and click the properties button. This will bring up the window that allows you to fill out the network key.&lt;br /&gt;6.Select WPA-PSK from the Network Authentication dropdown and select TKIP from the Data encryption menu.&lt;br /&gt;7.Type or rather paste your network key in both the network key fields at the bottom.&lt;br /&gt;8.Click OK.&lt;br /&gt;&lt;br /&gt;Your computer should now reconnect to the router using WPA wireless security and the proper network key. You can consider your network well secured now.</description><link>http://technosavvyspot.blogspot.com/2008/01/to-configure-wpa-for-powerful.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-7976862905258164826</guid><pubDate>Thu, 10 Jan 2008 13:58:00 +0000</pubDate><atom:updated>2008-01-10T06:33:58.394-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">user query</category><title>How to encrypt data on lan (i m already using it password protected/authorised)?</title><description>write your query clearly.There are different kinds of encryption but what type of it, is required by you? Anyways here it goes and tell if it helped or not by posting comment on the site so that i can help further. you have to read these things because i dont know which encryption are you using WEP or WPA.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;KEY POINT to prevent misuse of WiFi Facility by unauthorized user, ALWAYS USE Security feature of WiFi router given above and repeated below again:&lt;br /&gt;&lt;br /&gt;SSID : The SSID is a unique name to identify the ADSL Router in the wireless LAN. Wireless clients associating to the ADSL Router must have the same SSID.&lt;br /&gt;Broadcast SSID Select No to hide the SSID such that a station can not obtain the SSID through passive scanning. Select Yes to make the SSID visible so a station can obtain the SSID through passive scanning.&lt;br /&gt;&lt;br /&gt;Wireless LAN :: WEPWEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the wireless network. Select Disable to allow all wireless computers to communicate with the access points without any data encryption.Select 64-bit WEP or 128-bit WEP to use data encryption.Key#1~Key#4 The WEP keys are used to encrypt data. Both the ADSL Router and the wireless clients must use the same WEP key for data transmission.If you chose 64-bit WEP, then enter any 5 Characters each key (1-4). If you chose 128-bit WEP, then enter 13 characters for each key (1-4).The values must be set up exactly the same on the Access Points as they are on the wireless client stations. The same value must be assigned to Key 1 on both the access point (your ADSL Router) and the client adapters, the same value must be assigned to Key 2 on both the access point and the client stations and so on, for all four WEP keys.&lt;br /&gt;Wireless LAN :: WPA-PSKWi-Fi Protected Access, pre-shared key. Encrypts data frames before transmitting over the wireless network.Pre-shared Key The Pre-shared Key are used to encrypt data. Both the ADSL Router and the wireless clients must use the same WPA-PSK key for data transmission. Key Length 8 – 64 characters.&lt;br /&gt;&lt;br /&gt;Wireless LAN :: MAC FilterYou can allow or deny a list of MAC addresses associated with the wireless stations access to the ADSL Router.Status Use the drop down list box to enable or disable MAC address filtering.Action Select Deny Association to block access to the router, MAC addresses not listed will be allowed to access the router. Select Allow Association to permit access to the router, MAC addresses not listed will be denied access to the router.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Or if you want folder encryption goto this site to download encryption software but all are shareware if i find some freeware then will post on this site :&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.hiteksoftware.com/autokrypt/download_file_encryption.htm"&gt;http://www.hiteksoftware.com/autokrypt/download_file_encryption.htm&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.all-internet-security.com/encryption/"&gt;http://www.all-internet-security.com/encryption/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Say no to WEP &amp;amp; use WPA:&lt;br /&gt;&lt;br /&gt;Back when the first consumer WLAN hardware hit the streets more than six years ago, they came with a technology called WEP, or wired equivalent privacy&lt;br /&gt;WEP was designed to protect a wireless network from eavesdropping, but it soon became apparent that due to myriad flaws, WEP's privacy was not at all equivalent to that of a wired network. Therefore, it wasn't long (though at the time it seemed like forever) before a new technology called WPA — Wi-Fi Protected Access — debuted to address many of WEP's shortcomings.&lt;br /&gt;WPA has been a mainstream technology for years now, but WEP remains a standard feature on virtually every wireless router on store shelves today. Although it's mainly there for backward compatibility with the oldest hardware, if reports and studies are accurate, a significant percentage of WLANs operating today (especially those used in homes) are still using outdated and insecure WEP for their encryption.&lt;br /&gt;Widespread use of WEP is almost understandable given that to the layperson, the similar abbreviations WEP and WPA don't convey any meaningful difference between the two security methods (and they may even imply equivalence) Plus, WEP is almost always presented first by the security interface of most broadband routers since WEP comes before WPA both historically and alphabetically).&lt;br /&gt;This week we'll take a look at why you shouldn't be using WEP anymore, and why WPA is a better choice.&lt;br /&gt;WEP — The Weak Encryption Protocol&lt;br /&gt;WEP's major weakness is its use of static encryption keys. When you set up a router with a WEP encryption key, that one key is used by every device on your network to encrypt every packet that's transmitted. But the fact that packets are encrypted doesn't prevent them from being intercepted, and due to some esoteric technical flaws it's entirely possible for an eavesdropper to intercept enough WEP-encrypted packets to eventually deduce what the key is.&lt;br /&gt;This problem used to be something you could mitigate by periodically changing the WEP key (which is why routers generally allow you to store up to four keys). But few bother to do this because changing WEP keys is inconvenient and time-consuming — it has to be done not just on the router, but on every device that connects to it. As a result, most people just set up a single key and then continue using it ad infinitum.&lt;br /&gt;A recent development reinforces how even changing WEP keys frequently is no longer sufficient to protect a WLAN. The process of "cracking" a WEP key used to require that a malicious hacker intercept millions of packets plus a fair amount of time and computing power.&lt;br /&gt;But technology moves fast, and that's no longer the case. In fact, researchers in the computer science department of a German university recently demonstrated the capability to compromise a WEP-protected network very quickly. After spending less than a minute intercepting data (fewer than 100,000 packets in all) they were able to compromise a WEP key in just three seconds, and they did it using a system equipped with a mere 1.7 GHz Pentium M CPU, which is less powerful than the processor found in today's entry-level notebooks.&lt;br /&gt;Of course, none of this means that there's necessarily someone lurking outside your window with the capability or desire to hack your wireless network in the blink of an eye. But given that it can be broken increasingly easily with commonly available equipment and software.&lt;br /&gt;&lt;br /&gt;*** Important***&lt;br /&gt;&lt;br /&gt;Switch to WPA&lt;br /&gt;Even if your router is several years old, it almost certainly supports some form of WPA (and if it doesn't, upgrading to the latest firmware may fix that). The easiest-to-use and most widely supported version is WPA Personal, sometimes referred to as WPA Pre-Shared Key (PSK).&lt;br /&gt;To encrypt a network with WPA Personal/PSK you provide your router not with an encryption key, but rather with a plain-English passphrase between 8 and 63 characters long. Using a technology called TKIP (for Temporal Key Integrity Protocol), that passphrase, along with the network SSID, is used to generate unique encryption keys for each wireless client. And those encryption keys are constantly changed. (Although WEP also supports passphrases, it does so only as a way to more easily create static keys, which are usually comprised of the hex characters 0-9 and A-F).&lt;br /&gt;Unfortunately, there are still wireless devices being sold today — mostly of the consumer electronics variety — that don't support WPA. Frankly, you should avoid buying any wireless device that does not support WPA. When it comes to regular PCs, WPA is supported by both Windows XP with Service Pack 2 and Mac OS X (as well as Windows Vista, naturally). In XP you won't find WPA options in the Data encryption drop-down menu found within the properties sheet for a wireless network connection. Look for it instead under Network Authentication, and then make sure that the choice you make for Data encryption — TKIP or AES — matches what your router is set for. (Many routers support AES, which offers stronger encryption that the kind used by TKIP.)&lt;br /&gt;Properly configured, WPA offers you infinitely better protection than WEP.&lt;br /&gt;If your router or its firmware is of relatively recent vintage (within the last 18-24 months), it may support WPA2, which provides further improvements over WPA, including using AES encryption by default.</description><link>http://technosavvyspot.blogspot.com/2008/01/how-to-encrypt-data-on-lan-i-m-already.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-2719996757530231541</guid><pubDate>Sun, 06 Jan 2008 17:17:00 +0000</pubDate><atom:updated>2008-01-07T04:51:35.928-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">user query</category><title>How to share drives/data on computers via lan (the dialer modem is in the wi-fi device itself, which receives the broadband connection)?</title><description>&lt;strong&gt;&lt;span style="font-size:130%;"&gt;For sharing drives first of all some points must be kept in mind:&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;1. All the computers in the network must be in same workgroup&lt;br /&gt;&lt;br /&gt;2. The drive which contains the file or folder which is to be shared must be shared too! Means to share the lunch box with ur friend, you must open it completely and give full permission to take the bread.Ex: For sharing My document folder first you should share c: drive or the root drive.&lt;br /&gt;&lt;br /&gt;1. To configure all computer in the same workgroup on xp:&lt;br /&gt;&lt;br /&gt;Right click on the my computer icon from the desktop and select properties.Goto computer name tab Then click on change button against To rename this computer or join a domain,click change. You can provide a unique name to your computer in the computer name box.&lt;br /&gt;&lt;br /&gt;After that in workgroup give the name of workgroup say MS office and click ok. This procedure should be applied on all the computers in the network. Provide the same name as MS office to all the computer's workgroup.&lt;br /&gt;&lt;br /&gt;After that click on the Remote tab in the system properties window.There you can give permission to those who can remotely connect to your computer on the network. Then click ok.&lt;br /&gt;&lt;br /&gt;After that goto My network places and from left hand side click on view network connectios. Then select the LAN through which this computer is in network and right click on it and then properties. In that window goto Internet protocol(TCP/IP) and click on properties and check the ip address is there or not. Because it should be there as your system is already in network. Then click ok.&lt;br /&gt;&lt;br /&gt;After this ping every computer on the network with their ip address or computer name( present in my computer&gt; right click properties&gt; computer name&gt;see full computer name.)&lt;br /&gt;&lt;br /&gt;For pinging : Goto start&gt; Run&gt; cmd then ok. Come to C prompt or&lt;br /&gt;&lt;br /&gt;C:\&gt; Ping ip address or computer name. If all the computers will be on it will display Reply from say 34.67.191.178 ..........&lt;br /&gt;&lt;br /&gt;The ping will show you that all the computers are working properly and are in the network.&lt;br /&gt;&lt;br /&gt;Then comes the main part drive sharing.&lt;br /&gt;&lt;br /&gt;2. To share a drive goto my computer by double clicking on it. Click on the drive which you want to share. Say C: Right click on it and goto Sharing and security Then click on the link If you understand the risk but still want to share the root of the drive,click here.&lt;br /&gt;&lt;br /&gt;C: drive properties window will be opened.&lt;br /&gt;&lt;br /&gt;Then in the Network sharing and security click on Network Setup wizard.It will take you further and then comes select a connection method. If your computer is the gateway then select first option or if some other computer is the default gateway then select second option else other. But recommended is second option and click next. then you can give description for this computer and can change the name of computer here also. Then workgroup name Ms Office as setup earlier then next.Then you can enable file and printer sharing then next.* Gateway: the first computer in the network having ip: 192.168.0.1 (Recommended)or something else.After that click on fourth option just want to finish. Then it will ask to restart your computer. Restart it.&lt;br /&gt;&lt;br /&gt;Then again goto my computer and right click on C: drive sharing and security &gt; go further Then under network sharing and security.Check the box share this folder on the network. you can give any share name which users on other networked computers will use to access this disk or folder. For maximum compatibility with all versions of Windows, use 1-12 characters. By default, users on other computers have full access: they can read, write, and delete shared files. If you only want them to be able to read files, un-check Allow network users to change my files.&lt;br /&gt;&lt;br /&gt;Warning: If a user has full access, deleting a file doesn't put it in the Recycle Bin. Once it's deleted, it's gone for good.&lt;br /&gt;&lt;br /&gt;3. On every machine you need to disable simple file sharing. Goto my computer then go to Tools -&gt; Folder Options -&gt; View -&gt; and uncheck Use simple file sharing (Recommended).&lt;br /&gt;&lt;br /&gt;4. Turn off the Windows firewall.&lt;br /&gt;&lt;br /&gt;Restart your computer.&lt;br /&gt;Follow the same steps as above on all computers in the network.&lt;br /&gt;&lt;br /&gt;There is no relationship between sharing and wi-fi or wired connection there should be connection either wired or wireless. No relation again with broadband.your internet is working through LAN card but sharing is nothing to do with broadband or dial up or dsl.&lt;br /&gt;&lt;br /&gt;To see which computers are in the workgroup goto My network places and view workgroup computers. In my network places you will be able to see all the drives which are shared in the network and can access from there !!!!!!!!!!!!!!!! Work is done successfully! Further assistance would be provided in this regard.&lt;br /&gt;&lt;/span&gt;</description><link>http://technosavvyspot.blogspot.com/2008/01/how-to-share-drivesdata-on-computers.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-1449467670360020334</guid><pubDate>Sat, 05 Jan 2008 10:32:00 +0000</pubDate><atom:updated>2008-01-06T01:57:09.326-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">user query</category><title>ssd vs conventional hdd</title><description>&lt;object height="350" width="425"&gt;&lt;param name="movie" value="http://www.youtube.com/v/S_Y6kTt99R8"&gt;&lt;br /&gt;   &lt;embed src="http://www.youtube.com/v/S_Y6kTt99R8" type="application/x-shockwave-flash" width="425" height="350"&gt;&lt;/embed&gt;  &lt;/object&gt;&lt;br /&gt;&lt;br /&gt;On the right hand side laptop using ssd and on the left conventional hard drive.</description><link>http://technosavvyspot.blogspot.com/2008/01/sdd-vs-conventional-hdd.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-7631329706809499594</guid><pubDate>Sat, 05 Jan 2008 09:58:00 +0000</pubDate><atom:updated>2008-01-05T02:00:08.703-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">user query</category><title>Is there any definite advantage of solid state hard drives as compared to the conventional hdd??</title><description>Yes Solid State hard drives are better than conventional one but the demerits are it's very expensive.Read this article and hope you get your answer. See the video too n get your answer to the question.&lt;br /&gt;&lt;br /&gt;The SSD drives with SATA interfaces are terrific because they can be used in current laptops with no mods, the real performance of flash memory is only going to be unlocked when we cast aside the legacy of spinning disks and their cases and interfaces and mount SSDs on the mobo like we do RAM modules.&lt;br /&gt;&lt;br /&gt;Micron announced that they will be releasing the RealSSD line of solid state drives, including a 64GB drive. While the entire line ranges from 1GB to 64GB, the 32 and 64 GB models are geared toward notebook and desktop use. The drives feature a SATA II interface and draw a mere 2 watts of power.&lt;br /&gt;&lt;br /&gt;The best way to explain why SSD is a buzz acronym for the solid state drives we want in our notebooks is to show the problems with practically stone-age spinning hard drives inside most computers (and iPod classics). Since they have platters w/ magnetized surfaces that spin fast as they read or write data—think record player—they can be quite slow, and are really fragile. Anyone who's owned a computer or iPod knows (or will one day learn) that if the read/write head bumps into the platter, it's all over. SSDs aren't like that at all.&lt;br /&gt;&lt;br /&gt;SSDs have no moving parts, so seek time is drastically reduced. No spinning=less battery vampirage, so your laptop lasts longer too. And finally, the lack of a deadly read-write head means you can drop your SSD-powered lappy with far less chance of weeping. Right now, SSDs are usually made with either SDRAM (like RAM used in computers) or NAND flash (like in thumb drives, iPod nanos, etc.). Flash is more common, since it doesn't need a battery even though it's slower. Problems: Gig for gig, SSD is way expensive. The beefiest you'll be able to get soon is 128GB (or maybe 256GB)—but the current 64GB 2.5" SSDs go for $1,100 and up.</description><link>http://technosavvyspot.blogspot.com/2008/01/is-there-any-definite-advantage-of_05.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-4788825014343814953</guid><pubDate>Sun, 18 Nov 2007 09:04:00 +0000</pubDate><atom:updated>2007-11-18T01:23:48.209-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">user query</category><title>youtube download</title><description>How one can download videos from youtube?&lt;br /&gt;*download the required software from &lt;a href="http://www.vdownloader.es/"&gt;http://www.vdownloader.es/&lt;/a&gt; . it works great.also converts the downloaded software from one format to another.</description><link>http://technosavvyspot.blogspot.com/2007/11/utube-download.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-3642097621086931060</guid><pubDate>Fri, 26 Oct 2007 07:35:00 +0000</pubDate><atom:updated>2007-10-26T00:42:13.300-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">user query</category><title>What is the proper way to clean tft monitor.Please suggest any good product for that.</title><description>A damp, soft lint-free cloth (do not use solvents), or a drysoft lint-free cloth with Isopropyl Alcohol. Clean with straightstrokes in one direction only.&lt;br /&gt;&lt;br /&gt;Under no circumstances use any of the following, or substances based on them:&lt;br /&gt;&lt;br /&gt;Acetone,Ammonia,Ethyl Acid,Ethyl Alcohol,Methyl Chloride .&lt;br /&gt;&lt;br /&gt;Do not use paper towels - they are abrasive.Only use "Computer Wipes" if they are specifically for LCD.&lt;br /&gt;&lt;br /&gt;LCD Cleaning liquids are available in market.you can prefer any brand.</description><link>http://technosavvyspot.blogspot.com/2007/10/what-is-proper-way-to-clean-tft.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-3360794527210467409</guid><pubDate>Thu, 27 Sep 2007 13:57:00 +0000</pubDate><atom:updated>2011-11-10T02:22:45.734-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">tips</category><title>Increase virtual RAM</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: #3333ff; font-size: 130%;"&gt;&lt;strong&gt;To increase virtual memory of your pc to make it fast :&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
Whenever we open some applications all the files associated with it loaded in the windows reserved memory for fast processing. You can use it for playing games and running applications which require higher RAM. Just follow the steps given below.&lt;br /&gt;
&lt;br /&gt;
Right click on My Computer Icon on Desktop &amp;gt;&amp;gt; Go to Properties &amp;gt;&amp;gt; Go to Advanced &amp;gt;&amp;gt; Go to Performance - Settings &amp;gt;&amp;gt; Go to Advanced &amp;gt;&amp;gt; Go to Virtual Memory - Change Keep the initial size same as recommended and maximum size double of it then restart your system. It will improve speed of windows and you can play some games which require higher RAM.






&lt;iframe src="http://origin-img.shaadi.com/shaadi-rewards/get-banner.php?ptnr=kl8bs&amp;banner_type=buttons&amp;banner_size=468x60&amp;ad_type=iframe" width="468" height="60" scrolling="no" frameborder="0" marginwidth="0" marginheight="0"&gt;&lt;/iframe&gt;
&lt;/div&gt;</description><link>http://technosavvyspot.blogspot.com/2007/09/increase-virtual-ram.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-7693642664240904759</guid><pubDate>Thu, 27 Sep 2007 10:31:00 +0000</pubDate><atom:updated>2007-09-27T03:35:26.389-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">mobile</category><title>Free mobile softwares</title><description>&lt;strong&gt;&lt;span style="font-size:130%;"&gt;&lt;span style="color:#3333ff;"&gt;MsvdriveE : ( freeware)&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;It saves your msgs directly on to your memory card(mmc).but first take back up of your messages and contacts and save them to your pc.then install this software on your cellphone.Because after installing this software you will not be able to see your previous&lt;br /&gt;messages on your phone memory.works great for Nokia 3230 , n-gage &amp;amp; many more.&lt;br /&gt;&lt;br /&gt;Name of software (freeware) : Msvdrivee&lt;br /&gt;&lt;br /&gt;Search this software in google search on this page.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="font-size:130%;color:#3333ff;"&gt;Get free mobile webcam software WWIGO:&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;Download from here:&lt;br /&gt;&lt;br /&gt;&lt;a href="http://motvik.com/"&gt;http://motvik.com/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;first you have to register on this site and then you can download the software for almost all cellphones.</description><link>http://technosavvyspot.blogspot.com/2007/09/free-mobile-softwares.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-1726079407559358513</guid><pubDate>Thu, 27 Sep 2007 10:25:00 +0000</pubDate><atom:updated>2007-09-27T03:30:35.181-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">software</category><title>Free Softwares</title><description>&lt;strong&gt;&lt;span style="font-size:130%;color:#3333ff;"&gt;oebackup for outlook express backup :&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;Backup ur mails, contacts n settings of outlook express using this free software:&lt;br /&gt;&lt;br /&gt;Name of software(freeware): outlook express quick backup or oebackup&lt;br /&gt;&lt;br /&gt;search this using google search on this page.</description><link>http://technosavvyspot.blogspot.com/2007/09/free-softwares.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-7478925308765514420</guid><pubDate>Thu, 27 Sep 2007 10:05:00 +0000</pubDate><atom:updated>2007-09-27T03:19:18.838-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">tips</category><title>Tips &amp; Tweaks</title><description>&lt;div align="justify"&gt;&lt;span style="font-size:130%;"&gt;&lt;strong&gt;&lt;span style="color:#3333ff;"&gt;1) Download videos from YouTube &amp;amp; google videos:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Goto youtube.com and open any video by searching through search button.&lt;br /&gt;&lt;br /&gt;Then copy the url of that video from the address bar of browser and then&lt;br /&gt;&lt;br /&gt;open &lt;a href="http://www.videodl.org/"&gt;http://www.videodl.org/&lt;/a&gt; paste the copied url in the address bar of&lt;br /&gt;&lt;br /&gt;videodl.org n click GET IT. Then a download link will be provided click on&lt;br /&gt;&lt;br /&gt;that link and download any video of your choice. After downloading&lt;br /&gt;&lt;br /&gt;rename the file as : name.flv where name is name of file which may be anything and .flv is extension of flv file format .Same process for downloading through google videos.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:130%;"&gt;&lt;strong&gt;&lt;span style="color:#3333ff;"&gt;2) Gmail configuration for outlook express :&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;First of all go in your gmail inbox and under setting option enable pop and&lt;br /&gt;&lt;br /&gt;save the new settings.then in outlook express goto option tools and&lt;br /&gt;&lt;br /&gt;choose account.Tools&gt;Accounts&gt;Mail&gt;add&gt;mail&gt; Display name: your name.Email address: your full email addressMy incoming mail server is : pop3incoming mail server : pop.gmail.comoutgoing mail server : smtp.gmail.comAccount name : your full email address i.e. &lt;a href="mailto:someone.2@gmail.com"&gt;someone.2@gmail.com&lt;/a&gt;password : your password check the box remember your password.then next and then finish.then goto Tools&gt;Accounts&gt;Mail click on your mail a/c and then click on properties.goto server option and then check the box my server requires authentication.then click on log on using enter ur full a/c of gmail and your password.click ok then under connection option check the box always connect to this a/c using select ur connection type. Click the 'Advanced' tab. Check the box next to 'This server requires a secure connection (SSL)'&lt;br /&gt;under 'Outgoing Mail (SMTP).' Enter '465' in the 'Outgoing mail (SMTP):' field. Check the box next to 'This server requires a secure connection (SSL)' under 'Incoming mail (POP3).' The port will change to 995.after that click OK .now your a/c is ready 2 use.Yahoo mails configuration is also same as Gmail .Recently yahoo has changed its port , it’s same as gmail now as following: Click the 'Advanced' tab. Check the box next to 'This server requires a secure connection (SSL)'&lt;br /&gt;under 'Outgoing Mail (SMTP).' Enter '465' in the 'Outgoing mail (SMTP):' field. Check the box next to 'This server requires a secure connection (SSL)' under 'Incoming mail (POP3).' The port will change to 995.after that click OK .now ur a/c is ready 2 use.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="font-size:130%;color:#3333ff;"&gt;3)&lt;/span&gt;&lt;/strong&gt; You can run a program as a different user without logging out and back&lt;br /&gt;&lt;br /&gt;in again. Right click the icon, select Run As... and enter the user name&lt;br /&gt;&lt;br /&gt;and password you want to use. This only applies for that run. The trick is&lt;br /&gt;&lt;br /&gt;particularly useful if you need to have administrative permissions to install&lt;br /&gt;&lt;br /&gt;a program, which many require. Note that you can have some fun by&lt;br /&gt;&lt;br /&gt;running programs multiple times on the same system as different users,&lt;br /&gt;&lt;br /&gt;but this can have unforeseen effects.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="font-size:130%;color:#3333ff;"&gt;4)&lt;/span&gt;&lt;/strong&gt; You can start up without needing to enter a user name or password.&lt;br /&gt;&lt;br /&gt;Select Run... from the start menu and type&lt;span style="color:#3366ff;"&gt; 'control userpasswords2' &lt;/span&gt;&lt;span style="color:#333333;"&gt;without quotes&lt;/span&gt;, which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="font-size:130%;color:#3333ff;"&gt;5)&lt;/span&gt;&lt;/strong&gt; A great new feature in Microsoft Windows XP is the ability to do a boot&lt;br /&gt;&lt;br /&gt;defragment. This places all boot files next to each other on the disk to&lt;br /&gt;&lt;br /&gt;allow for faster booting. By default this option is enabled,but on some&lt;br /&gt;&lt;br /&gt;systems it is not, so below is the information on how to turn it on:&lt;br /&gt;&lt;br /&gt;Go to Start Menu and Click RunType in regedit then click okFind "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOpt&lt;br /&gt;&lt;br /&gt;imizeFunction"Select "Enable" from the list on the rightRight on it and select "Modify"Change the value to Y .Reboot your Pc and see the change yourself.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:130%;color:#3333ff;"&gt;&lt;strong&gt;6) Folder options has been disabled :&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;go to run in the start menu.type gpedit.msc then select user&lt;br /&gt;&lt;br /&gt;config/administrative templates/windows componets/windows&lt;br /&gt;&lt;br /&gt;explorer....on the right you find a screen where there is an option.... hide&lt;br /&gt;&lt;br /&gt;folder options.disable it&lt;br /&gt;&lt;br /&gt;&lt;span style="color:#3333ff;"&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;7) Increase performance of your computer :&lt;/span&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;a)Right click on the My Computer icon on your desktop or in your start&lt;br /&gt;&lt;br /&gt;panel and select properties.b) Next, Click on the Advanced tab and hit the setting button under&lt;br /&gt;&lt;br /&gt;performance.c) On the visual effects tab, select Adjust for Best Performance and hit OK. Hit OK once more to exit system properties.&lt;br /&gt;&lt;br /&gt;if you want your pc really fast than after the step c) select CUSTOM option&lt;br /&gt;&lt;br /&gt;and select 'Use common tasks in floders' n than ok... remember that in&lt;br /&gt;&lt;br /&gt;custom option 'use common tasks option' will be selected only then hit OK&lt;br /&gt;&lt;br /&gt;Now your computer will run slightly faster !!!!!!!!&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="font-size:130%;color:#3333ff;"&gt;8)&lt;/span&gt;&lt;/strong&gt; Disable unwanted services.....Run &gt; services.msc and speed up your&lt;br /&gt;&lt;br /&gt;pc.&lt;br /&gt;&lt;br /&gt;But dont disable important services.&lt;/div&gt;</description><link>http://technosavvyspot.blogspot.com/2007/09/tips-tweaks.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254639271055025231.post-475521481833326978</guid><pubDate>Tue, 25 Sep 2007 19:56:00 +0000</pubDate><atom:updated>2007-09-27T03:49:03.169-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">user query</category><title>How can you block all remote connections to your computer</title><description>&lt;ul&gt;&lt;li&gt;&lt;strong&gt;&lt;span style="font-size:130%;color:#3333ff;"&gt;How can I block all remote connection to my computer?&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style="color:#3333ff;"&gt;&lt;/span&gt;&lt;br /&gt;&lt;div align="justify"&gt;If you are using Windows Xp then first of all right click on My computer icon on desktop and go to properties then go to remote tab and uncheck the box written Allow users to connect remotely to this computer and click ok. This will not allow your pc to connect remotely.&lt;/div&gt;</description><link>http://technosavvyspot.blogspot.com/2007/09/how-can-you-block-all-remote.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item></channel></rss>