If you're in such a hurry to share your photos online that you rarely edit them first, you're in luck. Picnik.com may well be the best online photo editing site as well as the newest.
The well-designed beta version of Picnik sets itself apart from the crowd by integrating with three photo-sharing Web sites: Flickr, Picasa Web Albums, and Facebook. Picnik can automatically display thumbnails of all your photos, and then you can edit or share them. (Alternatively, you can grab photos directly from your PC, a Webcam, or an online photo search--or even enter a URL.) If a photo exists online, Picnik can probably open it for you.
There is no download to install, so setup is a breeze; and you don't have to do anything special to get Picnik working with your favorite photo site, either. After a first-time sign-in to a photo-sharing site via Picnik, you click a 'connect' button to access to your photos for editing.
Picnik offers a slew of standard editing tools, including cropping, resizing, exposure adjustments, color fixes, sharpening, and red-eye removal. In many cases, you can auto-adjust or tweak your photo manually. When I explored the site, it offered almost two dozen special effects, including numerous color effects and such add-ons as rounded borders, frames, and darkened, vignette edges. Also noteworthy are several crazy sci-fi-like effects like Heat Map, which makes your photo look as though you were seeing it through the eyes of the creature from the movie Predator, and Goofy, which invites you to push pixels around the photo like wet paint.
The color and exposure auto-fixes are somewhat conservative, so I had to tweak my photos manually to get the exact look I wanted. But if you're willing to fiddle a bit, you can get great results, whether by adjusting the strength of boost control to increase color saturation or by choosing a specific shade of yellow or brown to use when converting a photo to sepia tone. When you're done editing, you can save the photo to your PC, upload it to any of the compatible sharing sites, or e-mail it.
While in beta, the entire site is free; but when Picnik officially launches, it will offer a premium account (the subscription fee has not yet been determined) that makes a dozen or so advanced effects and editing tools available, along with batch editing.
The interface is well organized and free of clutter. Four tabs across the top of the screen grant access to key activities, like opening photos, editing, adding effects, and sharing your finished projects. A full-screen button lets you switch between a browser window and the entire display. Picnik remembers what you were doing the last time you visited the site, too, and always asks whether you want to save your changes before opening a new photo in the editing page. A full "undo history" permits you to undo any edit at any time, all the way back to the original photo--even long after you've uploaded the photo to a sharing site.
Picnik clearly won't replace Photoshop. But compared to Picasa, my old favorite for basic editing, Picnik has more to offer--especially if you share most of your photos online and like the idea of editing them from the comfort of your Web browser.
Picnik - edit photos the easy way, online in your browser
Feedjit Live Blog
Edit Your Photos ONLINE
Sunday, September 28, 2008
at
8:21 AM
Amazing Longest WebSite
Just visit this awsome site, url will give you the idea itself
http://www.thelongestlistofthelonges...tlonglast.com/
at
8:10 AM
Hollywood Movie Mistakes
at
7:53 AM
Check Your Mobile's Originality...
Would like to know your mobile is original or not?!!
Type *#06#
After you enter the code you will see a new code contain 15 digits:
43 4 5 6 6 1 0 6 7 8 9 4 3 5
IF the digit number Seven & Eight is 02 or 20 that mean it was Assembly on Emirates which is very Bad quality Sad
IF the digit number Seven & Eight is 08 or 80 that mean it¢s manufactured in Germany which is not bad
IF the digit number Seven & Eight is 01 or 10 that mean it¢s manufactured in Finland which is Good
IF the digit number Seven & Eight is 00 that mean it¢s manufactured in France which is the best Mobile Quality ...
Friday, September 26, 2008
at
4:43 AM
PROXY SERVER
What is Proxy server?
A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.
A proxy server can also serve as a firewall.
What is Web proxies?
A common proxy application is a caching Web proxy. This provides a nearby cache of Web pages and files available on remote Web servers, allowing local network clients to access them more quickly or reliably.
When it receives a request for a Web resource (specified by a URL), a caching proxy looks for the resulting URL in its local cache. If found, it returns the document immediately. Otherwise it fetches it from the remote server, returns it to the requester and saves a copy in the cache. The cache usually uses an expiry algorithm to remove documents from the cache, according to their age, size, and access history. Two simple cache algorithms are Least Recently Used (LRU) and Least Frequently Used (LFU). LRU removes the documents that have been left the longest, while LFU removes the least popular documents. The algorithms can also be combined together.
Web proxies can also filter the content of Web pages served. Some censorware applications — which attempt to block offensive Web content — are implemented as Web proxies. Other web proxies reformat web pages for a specific purpose or audience; for example, Skweezer reformats web pages for cell phones and PDAs. Network operators can also deploy proxies to intercept computer viruses and other hostile content served from remote Web pages.
at
4:23 AM
What is VPN??
What is VPN
Virtual Private Network - VPN - has attracted the attention of many
organizations looking to both expand their networking capabilities and
reduce their costs.
VPN can be found in workplaces and homes, where they allow employees to
safely log into company networks. Telecommuters and those who travel
often find a VPN a more convenient way to stay connected to the
corporate internet. No matter your current involvement with VPNs, this
is a good technology to know something about. This VPN tutorial
involves many interesting aspects of network protocol design, Internet
security, network service outsourcing, and technology standards.
A VPN supplies network connectivity over a possibly long physical
distance. In this respect, a VPN is a form of WAN The key feature of a
VPN, however, is its ability to use public networks like the Internet
rather than rely on private leased lines. VPN technologies implement
restricted-access networks that utilize the same cabling and routers as
a public network, and they do so without sacrificing features or basic
security.
VPN supports at least three different modes of use:Remote access client connections LAN-to-LAN internetworking Controlled access within an intranet
VPN Pros and Cons
Like many commercialized network technologies, a significant amount of
sales and marketing hype surrounds VPN. In reality, VPNs provide just a
few specific potential advantages over more traditional forms of
wide-area networking. These advantages can be significant, but they do
not come for free.
potential problems with the VPN outnumber the advantages and are
generally more difficult to understand. The disadvantages do not
necessarily outweigh the advantages, however. From security and
performance concerns, to coping with a wide range of sometimes
incompatible vendor products, the decision of whether or not to use a
VPN cannot be made without significant planning and preparation.
Several network protocols have become popular as a result of VPN developments:PPTP L2TP IPsec SOCKS
These protocols emphasize authentication and encryption in VPNs.
Authentication allows VPN clients and servers to correctly establish
the identity of people on the network. Encryption allows potentially
sensitive data to be hidden from the general public.
vendors have developed VPN hardware and/or software products.
Unfortunately, immature VPN standards mean that some of these products
remain incompatible with each other.
VPN Solutions and Key Features
A
VPN supplies network connectivity over a possibly long physical
distance. In this respect, a VPN is a form of WAN VPNs enable file
sharing, video conferencing and similar network services. Virtual
private networks generally don't provide any new functionality that
isn't already offered through alternative mechanisms, but a VPN
implements those services more efficiently / cheaply in most cases.
key feature of a VPN is its ability to work over both private networks
as well as public networks like the Internet. Using a method called tunneling, a VPN use the same hardware infrastructure as existing Internet or internet links. VPN technologies includes various security mechanisms to protect the virtual, private connections.
Specifically, a VPN supports at least three different modes of use:Internet remote access client connections LAN-to-LAN internetworking Controlled access within an intranet
Internet VPNs for Remote Access
In recent years, many organizations have increased the mobility of
their workers by allowing more employees to telecommute. Employees also
continue to travel and face a growing need to stay connected to their
company networks.
can be set up to support remote, protected access to the corporate home
offices over the Internet. An Internet VPN solution uses a client/server design works as follows:
2. Next, the host initiates a VPN connection to the company VPN server. This connection is made via a VPN clientinstalled on the remote host.
3. Once the connection has been established, the remote client can
communicate with the internal company systems over the Internet just as
if it were a local host. Before VPNs, remote workers accessed company
networks over private leased lines or through dialup remote access
servers. While VPN clients and servers careful require installation of
hardware and software, an Internet VPN is a superior solution in many
situations. VPNs for Internetworking
Besides
using virtual private networks for remote access, a VPN can also bridge
two networks together. In this mode of operation, an entire remote
network (rather than just a single remote client) can join to a
different company network to form an extended intranet. This solution
uses a VPN server to VPN server connection. Intranet / Local Network VPNs
Internal
networks may also utilize VPN technology to implement controlled access
to individual subnets within a private network. In this mode of
operation, VPN clients connect to a VPN server that acts as the network
gateway.
use does not involve an Internet Service Provider (ISP) or public
network cabling. However, it allows the security benefits of VPN to be
deployed inside an organization. This approach has become especially
popular as a way for businesses to protect their WIFI local networks.
at
4:20 AM
More than 500 Hundred Movies Torrent
Guyz download this file and enjoy more than 500 hunderd DVD print movies.
http://rapidshare.com/files/133244306/Compendium_of_aXXo_Movies_as_of_4192008.rar.html
Dont forget to thank me
at
4:13 AM
Fun Tips and Tricks
Freecell Cheat
Start Freecell.
1. Hold down Ctrl + Shift + F10 together.
2. A dialog box shows up with 4 choices: Abort, Win, Retry or Cancel.
3. Click Abort and move (drag) any card to the top to win the game.
UPDATES:
1. Check this other FreeCell cheat, courtesy of Ari Lintula (ari.lintula@dlc.fi):
"Start a game. If you have moved a wrong card, quickly press F10 before clicking another card. It's the Undo button."
2. To sort all cards by color and in:
- ascending order: click Game -> click Select Game (hit F3) -> click Yes to cancel game in progress -> type -1 -> click OK.
- descending order: click Game -> click Select Game (hit F3) -> click Yes to cancel game in progress -> type -2 -> click OK.
Hearts
This Egg works ONLY with the Windows 95 and 98 releases of Microsoft Hearts. (Mshearts.exe).
1. Run Regedit.exe (the Win9x Registry editor, located in your Win9x folder) and go to: HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Applets\Hearts
2. In the right hand pane add a new String and name it "zb" (no quotes).
3. Give it a value of 42.
4. Now run Mshearts.exe and during gameplay press Ctrl + Alt + Shift + F12 the same time.
5. Have fun!
Solitaire
Start Solitaire.
In turn 3 cards over mode, you can turn over only one card at a time by holding down Ctrl+Alt+Shift
5. Have fun!
Minesweeper tips tricks cheat
Start Minesweeper.
After starting the game, type xyzzy and press Shift and Enter at the same time. Move the mouse over the playing area and keep your eye on the upper left corner of the Windows desktop. A white pixel will appear when the mouse pointer is over a safe square, and turn dark when the mouse is over a mine.
Outlook Express Easter Eggs
1. Click the Compose Message toolbar button.
2. Select Format -> Rich Text (HTML) from the menu.
3. Click on the body of the message. Select the font box, and type "athena" (without quotation marks).
4. Press Enter.
5. Close the Compose Message window.
6. Go back to the main Outlook Express window.
7. Select the Outlook Express icon, above inbox, on the left-hand side.
8. Click on an empty space between, for example, Read mail and Read News.
9. Type about. This will launch a little surprise."
Laughing dancing baby
You have just got to have a look at this. This is a variation of the old dancing baby, but this time you control the baby with your mouse.
If you have children, they are just going to love this, just as you will.
Make sure you have your speakers turned on, you will laugh for ages.
Laughing Baby
Tuesday, September 23, 2008
at
6:46 AM
Remove the Username and picture from Windows XP New Start Menu
To Change the picture
The User account picture can be removed by turning off the Welcome Screen. Or, by switching to Windows Classic theme. Follow the method described in this article if you want to remove the username and picture from the Start Menu, without disabling the Welcome Screen and Windows XP Theme.
For those who want to remove the user name and user account picture from Start Menu, in order to have a blank blue panel at the top, try this:
Start Windows Explorer and go to this folder:
C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures
From that folder, rename the BMP file which corresponds to your user account.
( For example, if your username is Yousuf, rename Yousuf.bmp to old_Yousuf.bmp )
Next, rename the following folder:
C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures
to something else, say...
C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\No_Default Pictures
To Change Username
Start regedit.exe and navigate to the this key: HKEY_CURRENT_USER \ Software \ Microsoft\ Windows \ CurrentVersion \ Policies \ Explorer
Close Regedit.exe and restart Windows.
at
6:41 AM
Repair Windows
Windows hangs at log off and needs re-start manually
Sometimes when we log off system goes to hanging state in log off mode and needs to be re-started manually. After this we receive an error message which says ?sas window : winlogon.exe the exception integer division by zero oxc00000094 occurred in the application at location 0?10003e3b?
Try to do the following:
This type of problem is caused when some software or virus which has infected your system has corrupted one of system files. In this case you will have to repair windows to replace the corrupted windows files with the original setup file.
Note: In order to repair windows you need the windows setup CD / DVD handy.
Follow the procedure below to repair your widows:
1. Arrange the windows setup CD / DVD.
2. Insert the windows setup CD/DVD into your CD/DVD drive.
3. Open Start >> Run and type ?SFC /SCANNOW? and press enter.
The above procedure repair all the system files. We hope information provided above helps to fix the trouble.
at
6:37 AM
Makes Run Your Windows Faster As Never Before
DISABLE INDEXING SERVICES
Indexing Services is a small little program that uses large amounts of RAM and can often make a computer endlessly loud and noisy. This system process indexes and updates lists of all the files that are on your computer. It does this so that when you do a search for something on your computer, it will search faster by scanning the index lists. If you don't search your computer often, or even if you do search often, this system service is completely unnecessary. To disable do the following:
1. Go to Start
2. Click Settings
3. Click Control Panel
4. Double-click Add/Remove Programs
5. Click the Add/Remove Window Components
6. Uncheck the Indexing services
7. Click Next
OPTIMISE DISPLAY SETTINGS
Windows XP can look sexy but displaying all the visual items can waste system resources. To optimise:
1.Go to Start
2. Click Settings
3. Click Control Panel
4. Click System
5. Click Advanced tab
6. In the Performance tab click Settings
7. Leave only the following ticked:
- Show shadows under menus
- Show shadows under mouse pointer
- Show translucent selection rectangle
- Use drop shadows for icons labels on the desktop
- Use visual styles on windows and buttons
SPEEDUP FOLDER BROWSING
You may have noticed that everytime you open my computer to browse folders that there is a slight delay. This is because Windows XP automatically searches for network files and printers everytime you open Windows Explorer. To fix this and to increase browsing significantly:
1. Open My Computer
2. Click on Tools menu
3. Click on Folder Options
4. Click on the View tab.
5. Uncheck the Automatically search for network folders and printers check box
6. Click Apply
7. Click Ok
8. Reboot your computer
OPTIMISE YOUR PAGEFILE
If you give your pagefile a fixed size it saves the operating system from needing to resize the page file.
1. Right click on My Computer and select Properties
2. Select the Advanced tab
3. Under Performance choose the Settings button
4. Select the Advanced tab again and under Virtual Memory select Change
5. Highlight the drive containing your page file and make the initial Size of the file the same as the Maximum Size of the file.
Windows XP sizes the page file to about 1.5X the amount of actual physical memory by default. While this is good for systems with smaller amounts of memory (under 512MB) it is unlikely that a typical XP desktop system will ever need 1.5 X 512MB or more of virtual memory. If you have less than 512MB of memory, leave the page file at its default size. If you have 512MB or more, change the ratio to 1:1 page file size to physical memory size.
REMOVE THE DESKTOP PICTURE
Your desktop background consumes a fair amount of memory and can slow the loading time of your system. Removing it will improve performance.
1. Right click on Desktop and select Properties
2. Select the Desktop tab
3. In the Background window select None
4. Click Ok
REMOVE FONTS FOR SPEED
Fonts, especially TrueType fonts, use quite a bit of system resources. For optimal performance, trim your fonts down to just those that you need to use on a daily basis and fonts that applications may require.
1. Open Control Panel
2. Open Fonts folder
3. Move fonts you don't need to a temporary directory (e.g. C:\FONTBKUP?) just in case you need or want to bring a few of them back. The more fonts you uninstall, the more system resources you will gain.
DISABLE UNNECESSARY SERVICES
Because Windows XP has to be all things to all people it has many services running that take up system resources that you will never need. Below is a list of services that can be disabled on most machines:
Alerter
Clipbook
Computer Browser
Distributed Link Tracking Client
Fast User Switching
Help and Support - (If you use Windows Help and Support leave this enabled)
Human Interface Access Devices
Indexing Service
IPSEC Services
Messenger
Netmeeting Remote Desktop Sharing (disabled for extra security)
Portable Media Serial Number
Remote Desktop Help Session Manager (disabled for extra security)
Remote Procedure Call Locator
Remote Registry (disabled for extra security)
Remote Registry Service
Secondary Logon
Routing & Remote Access (disabled for extra security)
Server
SSDP Discovery Service - (Unplug n' Pray will disable this)
Telnet
TCP/IP NetBIOS Helper
Upload Manager
Universal Plug and Play Device Host
Windows Time
Wireless Zero Configuration (Do not disable if you use a wireless network)
Workstation
To disable these services:
Go to Start and then Run and type "services.msc"
Doubleclick on the service you want to change
Change the startup type to 'Disable"
TURN OFF SYSTEM RESTORE
System Restore can be a useful if your computer is having problems, however storing all the restore points can literally take up Gigabytes of space on your hard drive. To turn off System Restore:
Open Control Panel
Click on Performance and Maintenance
Click on System
Click on the System Restore tab
Tick 'Turn off System Restore on All Drives'
Click 'Ok'
REMOVE ANNOYING DELETE CONFIRMATION MESSAGES
Although not strictly a performance tweak I love this fix as it makes my machine 'feel' faster. I hate the annoying 'are you sure?' messages that XP displays, especially if I have to use a laptop touchpad to close them. To remove these messages:
1. Right-click on the 'Recycle Bin' on the desktop and then click 'Properties'
2. Clear the 'Display Delete Confirmation Dialog' check box and click 'Ok'
If you do accidently delete a file don't worry as all is not lost. Just go to your Recycle Bin and 'Restore' the file.
DISABLE PREFETCH ON LOW MEMORY SYSTEMS
Prefetch is designed to speed up program launching by preloading programs into memory - not a good idea is memory is in short supply, as it can make programs hang. To disable prefetch:
1. Click 'Start' then 'Run'
2. Type in 'Regedit' then click 'Ok'
3. Navigate to 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contr ol\Session Manager\Memory Management\PrefetchParameters\'
4. Right-click on "EnablePrefetcher" and set the value to '0'
5. Reboot.
at
6:18 AM
MSN Tricks
Blank nickname
If you want a black nickname just go to the screen where you can change your nickname, remove your old nickname and press this: hold down alt and then type the following numbers (use the right side of the keyboard) 0160.
Change IM warning
click start press run and type regedit. Press enter and now you are in the registry of your computer. Now press ctrl + F. Now you get a search box. Type: IMWarning and press search. Now you can change the IMwarning to \"MSNtools.net, the best msntools site ever\" or something else you want.
Codes for in a IM window
Add a contact = /addcontact
Block = /block
Unblock = /unblock
View Profile = /profile
Invite = /invite
Page = /page
Phone = /phone
VoiceChat = /voice
VideoChat = /video
Send Message = /msg
Send E-mail = /sendmail
Send File = /sendfile
Action Message = /me
No emoticon Message = /noicon
Block Group = /blockgroup
Unblock Group = /unblockgroup
Check E-mails = /emails
Lock Msngr = /lock
Close Window = /close
Color Codes
White = (!FC0)
Brown = (!FC1)
Navy = (!FC2)
Green = (!FC3)
Red = (!FC4)
Maroon = (!FC5)
Purple = (!FC6)
Olive = (!FC7)
Yellow = (!FC8)
Lime = (!FC9)
Teal = (!FC10)
Aqua = (!FC11)
Blue = (!FC12)
Pink = (!FC13)
Gray = (!FC14)
Silver = (!FC15)
Get someones IP
First you must send a large file (500 KB is enough). While sending open MS Dos prompt. When you opened this type: netstat , now you will see some IP's. Now search for the IP what is not your own IP. The only IP left is your victims IP.
Msn plus! shortcuts
CurrentTime = (!T)
CurrentDate = (!D)
MyName = (!NP)
MyEmail = (!MP)
ContactNames = (!N)
ContactEmail = (!M)
CurrentIp = (!IP)
BoldText = (!FB)
ItalicText = (!FI)
UnderlinedText = (!FU)
TextColour = (!FC)
TextBackgroundColour = (!FG)
ResetFormat = (!FR)
Online = /online
Busy = /busy
Be Right Back = /brb
Away = /away
On the Phone = /onphone
Out to Lunch = /lunch
Appear Offline = /appearoffline
Sign Out = /signout
Remove MSN today popup
When you use MSN messenger 5.0 , everytime you sign in msn today will popup. To avoid this click tools on the main Messenger window then click options, then click on the general tab, then untick the box display msn today when Messenger sign's in. Done
The sounds
/skiss <--- a kissing sound
/sbrb <--- i'll be back !
/sevillaugh <---Just an evil laugh
/shello <---Howdy do!
/sdoh <---Doh!
When you don't want text by the sounds just copy these things:
# <<---- Howdy Ho
\" <<---- Muahahahaha
% <<---- *kiss*
$ <<--- Doh!
! <<--- Ill be bacK
at
6:14 AM
Mobile Dictionary
3G Third-Generation 3G enabled phones are capable of browsing the internet, receiving and sending email, live video streaming, and much more. High data speeds characterize this technology and turn your phone into a powerful tool for accessing online and mobile content. There are several different 3G technology standards. The most prevalent is UMTS, which is based on WCDMA. (WCDMA and UMTS are often used interchangeably.) Bluetooth Bluetooth provides an easy way to wirelessly connect and exchange information between mobile phones and electronic devices like laptops, PCs, printers and digital cameras, wireless headsets; basically any device that bears the Bluetooth icon. Faster than infrared and more secure, Bluetooth is an essential feature for maximum mobile phone connectivity. Calendar Phone calendars allow you to enter event and appointment data. Some even allow you to set reminders that will alert you when your appointment time draws near. Cellular A radio phone system in which a network of transmitters links the mobile user to the public phone system. Each transmitter covers users in its own ‘cell’. Desktop charger Cradle for holding a phone upright while it is charging Dual Band Phones that can switch between two different bands of frequencies. All new phones in the Pakistan are now dual-band, capable of switching between GSM1800 and GSM900 frequencies. Useful for travelers allowing roaming on a greater number of networks across the world EDGE (Enhanced Data for GSM Evolution) A digital mobile phone technology which enhances 2G and 2.5G (a.k.a. GPRS (General Packet Radio Service)) networks. This technology also works in TDMA and GSM networks. EDGE (also known as EGPRS) is a superset to GPRS and can function on any network with GPRS deployed on it (provided the carrier implements the necessary upgrades). High-speed data applications such as video services and other multimedia benefit from EGPRS' increased data capacity. EMS (Enhanced Messaging Service) An EMS enabled mobile phone can send and receive messages that have special text formatting (such as bold or italic), animations, pictures, icons, sound effects and special ring tones. EMS messages that are sent to devices that do not support it will be displayed as SMS transmissions. ESN (Electronic Serial Number) Each cellular phone is assigned a unique ESN, which is automatically transmitted to the cellular tower station every time a cellular call is placed. External Memory Card A removable flash drive suitable for storing music, photos and other data. Memory cards come in a variety of memory sizes and allow for easy transfer of data between your phone and other electronic devices that accept memory cards. They also allow in most cases the ability to increase your phone's memory significantly. With today's phones ever-increasing capabilities for photos and music, an external memory card is essential. GPRS (General Packet Radio Service) A mobile phone data service available to users of GSM mobile phones. It is often described as "2.5G", that is, a technology between the second (2G) and third (3G) generations of mobile telephony. GPRS promises data speeds of up to 115 kbits and allows for relatively fast internet access. GSM (Global System for Mobile Communications) GSM is the most popular standard for mobile phones in the world used by over 1.5 billion people across more than 210 countries and territories. The ubiquity of the GSM standard makes international roaming very common between mobile phone operators, enabling subscribers to use their phones in many parts of the world. GSM differs significantly from its predecessors in that both signaling and speech channels are digital, which means that it is considered a second generation (2G) mobile phone system. Hands-free Allows users to talk and listen without holding the phone up to their ear via a microphone and speakers. Useful for conference calls and doing other tasks while talking on phone. HSCSD (High Speed Circuit Switched Data) Increases data speeds on GSM networks from 9.6 kbps up to 57.6 kbps. IMEI (International Mobile Equipment Identity) Basically, an electronic “signature” used on digital mobile phones giving each phone its own unique identity. Infrared Port (IrDA) Infrared wireless technology uses a beam of light rather than radio signals to transmit information between mobile phones and other electronic devices like computers. Java (J2ME) Java 2 Micro Edition A feature that allows the device to run specially-written applications. Many mobile phone games and applications use this capability to run their programs. Many phones can download Java applications from the internet or via cable transfer from personal computers. LCD (Liquid Crystal Display) Electric currents are passed through a liquid crystal solution that lies between two panes of polarizing material. LCD displays are available in both color and black and white. Li-Ion battery (Lithium-Ion battery) Li-Ion batteries are lighter and have longer life cycles than NiCd and NiMH batteries. Li-Po Battery (Lithium Polymer battery) Lighter than Li-Ion batteries but with many of the same qualities, Li-Po batteries can also be molded into various shapes. Mega Pixel Phones with mega pixel cameras typically produce much better quality photos than VGA. The higher the number of mega pixels, the better the quality of photos. In some cases, camera phones with up to 2.0 mega pixels can produce photos as good as a standard digital camera. Micro-drive A mini hard drive for portable electronic devices. Compared to compact flash cards, a micro-drive gives slightly better transfer rates, is significantly cheaper and usually delivers better performance to smart phones with operating systems. However, micro-drives are slightly more fragile than compact flash cards and tend to use more battery power to keep the disc spinning. MMS (Multimedia Messaging System) Transmits messages with various kinds of multimedia contents like images, audio clips, even short videos over networks using WAP (Wireless Application Protocol). MP3 A popular digital audio encoding and lossy compression format designed to greatly reduce the amount of data required to represent audio, yet still sound like a faithful reproduction of the original uncompressed audio to most listeners. In popular usage, MP3 also refers to files of sound or music recordings stored in the MP3 format on computers. OLED (Organic Light-Emitting Diode) A type of display that is lighter, brighter, thinner and uses less energy than LCD displays. Polyphonic Ringtones Enhances sounds on your phone by producing multiple tones simultaneously. Predictive Text Input A very useful tool for writing any text message. Basically, after you type in one or two letters, the phone will “suggest” the word you are trying to spell based on letter combinations in its memory. Although it takes a bit of getting used to, it helps cut down drastically on time and character entries. Versions of Predictive Text Input include T9, iTAP and eZiText. PTT Push-To-Talk Two-way communication service that is similar to a "walkie talkie". Users do not need to dial a phone number if their contact is on the network; they simply need to “Push” a button to talk to them. However, PTT, unlike a normal mobile phone, can only communicate in one direction at a time. Both parties cannot hear each other at the same time. SIM (Subscriber Identity Module) The smart card used in digital phones that holds the user’s data and allows them to access the network. It can store personal information, contact names, SMS messages and more. SMS (Short Message Service) SMS is the most basic type of messaging service, enabling subscribers to send short text messages (usually about 160 characters) to and from mobile phones. STN (Super Twisted Nematic) A type of LCD display that uses less power than TFT technology but also has lower image quality and response. TFD (Thin Film Diode) A type of LCD display that has excellent image quality and fast response time without requiring as much power as TFT. TFT (Thin Film Transistor) A type of LCD displays technology. Excellent response time and image quality but more expensive and requires more power than other LCD displays. UMTS (Universal Mobile Telecommunications System) A 3G wireless communications technology. UMTS is the next generation for GSM networks. VGA (Video Graphics Array) The most basic type of camera phone. Shoots photos and sometimes even videos but images can be typically low in comparison to Mega Pixel camera phones. Voice Dialing A feature available only on selected phones that permits you to dial numbers by calling them out to your cellular phone, instead of dialing them manually. This function is especially convenient for making calls from your vehicle while driving. Voice Recognition Facility offered by a few handsets enabling calls to be made by using voice commands rather than punching in numbers. The memory can be programmed to store and identify names spoken into the handset and call numbers associated with them. Voicemail Mobile phone service provided by the networks that records a message for you when you can’t, or don’t want to answer a call. Unlike a traditional answer phone, the system can take messages for you when you are using the telephone. WAP Wireless Application Protocol. An agreed standard which enables WAP-compatible mobile phones to access Internet-type services (such as news, travel, entertainment, finance, sport etc) via their menu system and LCD screens. WCDMA (Wideband Code Division Multiple Access) A 3G wireless standard which offers voice and data speeds of 144 Kbps to 2 Mbps. WLAN (Wireless Local Area Network) Sometimes known as Wi-Fi, this technology gives mobile phones, laptops and other wireless devices the ability to access a local network. Users may then browse the internet and transfer content and data, all without the need to connect any cables. WLAN capable networks deliver much faster data speeds, longer signal ranges and a much richer mobile experience than Bluetooth or Infrared capable devices.
Saturday, September 20, 2008
at
7:28 AM
ATM TRICK
at
7:17 AM
Translation Website
Here is the website that is in BETA stage but works quiet well for translation from English to urdu...
at
7:14 AM
Check Your Connection Speed
This website will tell you, the speed of your real internet connection. check it out!!! and comment
at
7:08 AM
NAIL WATCH

We have seen many different types of futuristic watches with strange shapes and design but none so unique as this. Now lets welcome the Nail watch, that can be worn on the thumb. You may have never seen a watch that can be worn on the thumb but times are going to change thanks to Timex. Timex, in collaboration with Core77, held a global design competition called 2154: the future of time design. So what we are seeing here is the TX54 concept which was a runner up there.

Thanks to a translucent body, the design blends seamlessly with the nail while a selection of text color options and a glow feature activating on command make it supremely functional as well. Press the end of your thumbnail, and the watch will light up for you. A perfect blend of appearance, user interface, and technology, the nail watch passes most standards of modern design with flying colors thanks to its functional and minimalist appeal. The watch looks stylish and chic and has a touch of Geeky style as well. The downside of this watch is that it is disposable. So with so many stylish watched being available now, it will be hard for it to survive in the market. Though it is quite innovative with a minimalist design, but it won't last long on your finger.
No details about the availability or the price of this watch has been released by Timex. But since it is tiny and disposable, I don't expect the price to be high.
at
7:03 AM
WATCH MAKKAH LIVE!!
Keep this link saved, its awesome to look at it whenever you want.
Whenever you want to see Makkah Al Mukkarramah (Kaaba) live, click on the link above.
Sunday, September 14, 2008
at
10:23 PM
WHO IS MISCALLER???
at
10:17 PM
Virus and Your Mobile
A mobile phone virus or mobile malware - malicious mobile software - is a computer virus specifically adapted for the mobile phone environment and designed to spread from one vulnerable phone to another.
A virus is a program code that replicates by being copied to another program. Viruses can be transmitted as attachments to an email or in a download file. Some viruses take effect as soon as their code is executed; other viruses can lie dormant. A virus that replicates by resending itself as an email attachment or as a part of a network message is known as a worm.
Viruses can range from benign to quite harmful; they can erase data from the infected phone or send fake messages purporting to be from the phones owner. How prevalent are mobile phone viruses? The current security risk from mobile phone viruses and worms is low.
Until many more smart phones or PDAs are in use, and users of these phones are regularly exchanging executable files, the risk will remain low. The mobile industry takes the threat of viruses very seriously and is continually monitoring its networks and working to protect users from any future risk from mobile phone viruses. There are also some simple measures that individual users can implement to protect themselves.
What can I do to protect my phone?
The following tips can help prevent problems with viruses on your phone:
1. Switch to Bluetooth hidden mode. If your phone has Bluetooth capability, ensure that the Bluetooth capability is switched to hidden or invisible mode unless you specifically need it to be visible. This will help prevent other Bluetooth-enabled devices from finding your phone (unless you grant them the necessary permission) and will therefore help protect your phone from worms that spread using the Bluetooth wireless technology.
2. Exercise caution before opening attachments. When accepting applications sent via Bluetooth, or opening MMS attachments, exercise caution, just as you would when opening an email attachment on your PC, because they may include harmful software. Ensure the application or attachment comes from a known source, and is wary of opening files that have unfamiliar text attached to them, even if they come from someone you know.
3. Only download content from a trusted source. Trusted sources may include operator portals and other well-known brands that offer adequate protection against viruses and other harmful software. Be aware though that, as with emails, malicious or fraudulent users may be able to fake the appearance of a trusted source.
4. Consider anti-virus software. Some software is available to prevent phone viruses. You may wish to consider downloading this software.
at
10:15 PM
What is Bluetooth Technology?
Bluetooth, named after the renowned Danish King, Harold Bluetooth, is a short-range wireless connectivity standard. Bluetooth is capturing the minds of the present day technologists, as a technology enabler for the wireless unification of a wide variety of portable devices like mobile PCs, mobile phones and the like. It does away with the cables and enables voice and data transfer between the devices through wireless networks called piconets. The technology behind it: It is omni-directional and has a present nominal link range of 10cm to 10m, which can be extended to 100m, with increased transmitting power. Bluetooth operates in the 2.4GHz Industrial-Scientific-Medical (ISM) Band and uses a Frequency Hop (FH) spread spectrum technology in which packets are transmitted in defined time slots on defined frequencies. A full duplex information interchange rate of upto 1Mbps may be achieved in which a Time-Division Duplex (TDD) scheme is used. 1) A Radio Unit - consisting of a radio transceiver, which provides the radio, link between the Bluetooth devices. 2) A Baseband Unit - a hardware consisting of flash memory and a CPU. This interfaces with the radio unit and the host device electronics. 3) Link Management Software - a driver software or firmware which enables the application software to interface with the baseband unit. 4) An Application Software - this implements the user interface and is the application that can run on wireless.
The primary segments identified for Bluetooth application are: Cellular & PCS Mobile Phones, Digital Cordless Phones, Data Access Points, PC Cards and Adapters , Notebook & Desktop PCs, Handheld PCs & Palm Companions / PDA s, Digital Still Cameras, Output Equipment, Automotive and Industrial & Medical applications.
Bluetooth is a Radio Frequency (RF) specification for short-range, point-to-multi-point voice and data transfer. An advantage of Bluetooth is it's similarity to many other specifications already deployed and it's borrowing of many a feature from these specifications. The 2.4GHz band is used by IEEE 802.11 to enable wireless LAN connectivity. Bluetooth borrows specifications to enable file sharing and data transfers between devices from IrDA (a wireless specification that uses InfraRed light to connect devices). HomeRF SWAP, a specification aimed at small network of devices for the home environment, is another source for Bluetooth.
A Bluetooth System:
at
10:06 PM
For Music Lovers
Saturday, September 13, 2008
at
12:53 AM
DOWNLOAD GREAT AUDIO BOOKS!!
Hello Visitors
at
12:00 AM
Check Your IQ Level
Friday, September 12, 2008
at
10:23 PM
Learn MATH.. Lesson By Lesson
at
9:22 PM
Freeware Softwares and E-Books
From this website you can download Free Softwares and E-books.
at
9:06 PM
A Great Website !!!!
Hello Visitors....
at
8:58 PM
How to fix slow start-up on Nokia Phone (Any Symbian Phone)
at
8:50 PM
Double Your Recharge On Mobile!!!
at
8:30 PM
Using MSCONFIG Make Your Computer Start FAST
at
8:25 PM
Daily Horoscope on Your Mobile FREE
at
8:14 PM
Speed Up Your S60 Phone
Hello There!
Here Is A Way To Speed Up Your S60 Phones.Here it Goes:
First change ur phone date to 03/04/2005
Go to Menu -> Office -> To-do List.
Make a new to do note with following data :
Subject : Speed
Due date : 04/08/2005
Priority : High
Press Done, but don't Exit.
Now make another note with :
Subject : Qoukie
Due date : 04/08/2005
Priority : Low
Press Done & Exit to Stand-By screen.
Now go back again to To-do List.
Then press "options" & "mark as done"
( Do this to the notes in the order above )
Exit & update the phone date.
at
11:26 AM
Windows XP Home Edition & Windows XP Professional Edition?
at
9:42 AM
Passport database (SHOCKING)
at
9:20 AM
WONDERFUL TRICK OF SECRET CALL
Hello Friends!!! Aap ke liye boht he interesting tip laya hoon. agar aap chahte hain ke aap kisi ko call karien magar aap ka number us ki CLI par na aaye to yeh trick boht karamad sabit hogi. mein apne aksar doston ko is trick se heraan kar chuka hoon. to ab aap apne dostoon ko heraan karein . pehle aap yeh number dial karein 00448700360412 us ke baad aap apna desired number international format mein likhein (for example 0092333-------) aur finally # press karein aur kuch seconds wait karein magar dosto yeh trick free nahin hai is liye Try karne ke liye aap ke 2 rupees kharch honge aur per minute shayed kuch zyada kharch hoon, rates ka isliye nahin maloom kyunki mein ne kabhi call karke baat nahin ki just doston ko heraan kiya hai.
Thursday, September 11, 2008
at
11:01 PM