Friday, July 30, 2010

50% Mobile tower in Bhopal are illegal

Around 50 percent of the mobile towers in the State capital are illegal, concluded a  report of the Bhopal Municipal Corporation {BMC}. The civic body is responsible for issuing requisite permissions to these towers. In a list recently compiled by the civic body, it was discovered that as many as 160 of the total 318 mobile towers in the city were installed illegally, while only 160 were found to be complying with the norms.
    Interestingly, those termed illegal were found to be flouting municipal guidelines as the list does not take into account any health risks posed by these towers.
Ironically, of these 158 mobile towers of different companies, including Airtel, and Reliance, around 50 have been granted a stay order by the court, restraining the corporation from initiating action against them.
                                                                              While Airtel tops the list of illegally erected towers with as many as 50 such towers spread across various localities of the city, Reliance was found to own 21 illegal mobile towers. The remaining are owned by other private players in the telecom sectors. Most of these towers were termed as illegal, due to their failure to get the building strength certified of MANIT as required by municipal norms, said officials.

                                      The other pre-requisites for installing mobile towers including a no objection certificate {NOC} from the local ward office, depositing the requisite fee and completing relevant paperwork, which could only complete only commence after completion of the initial two steps.
Read rest of entry

Download Free BitDefender 2011 With 3 Months License Key

Get the ultimate proactive protection
BitDefender 2011 Beta application was designed to provide comprehensive proactive protection against viruses, spyware, hackers, spam and other Internet security threats, along with system maintenance and data backup.

           Some key features of BitDefender Total Security :
·         Protect against viruses and other malware using industry leading technology.
·         Scans all Web, e-mail and instant messaging traffic in real-time.
·         Provides an unmatched detection rate of new threats based on two different proactive technologies.
·         Blocks web pages that attempt to steal your credit data.
·         Prevents personal information from leaking via e-mail, Web or instant messenger.
·         File Vault securely stores personal information or sensitive fiels.
·         Automatically backs up files and folders.
BitDefender just released its latest version BitDefender 2011 and has offered a 180 day license key along with it.

                   Get free Bitdefender 2011 + 3 Months Licence Key
1.      Go to the registration page and create a new Bitdefender Beta account. {Link dene hai}
2.      You will receive your confirmation email. Then confirm your account and login.
3.      In the next page, check only BitDefender 2011 and then click next.
4.      Click Installation and configuration wizard test cases ant then copy down your license key which is for 90 days.
5.      Next, click Product registration and activatrion test cases and then copy the license key which is also for 90 days.

         Download:

Read rest of entry

Monday, July 26, 2010

Turn speech into text


    Can ”t get the hang of two-thumbed typing? Perplexed by predictive text? Cursed with sausage fingers? Or just plain lazy? Never fear. Your days of tapping messages into your mobile using tiny keys could be over after a new phone “app” Was released that turns speech into text. Users can dictate messages into the phone which displays what they have said on the screen at the tap of a button. It can then be sent as a text or email. The phone will also respond to demands for punctuation with commands such as “exclamation mark” or “mew paragraph”. Any mistakes can be tapping the screen to register an error and choosing from a drop-down list of replacements. And if the worst comes to the worst, you can always delete the words and type in the right one. Another benefit could be the end of abbreviations such as L8R {later} or LOL {laugh out loud} which became popular ways to save time while texting.
 Drawbacks include needing a good 3G connection, having to manually call up receipients details to  send the message, and problems with place names, proper nouns and regional accents. Nuance, the   American firm behind it which pioneered predictive text and provideos the in-car vioceactivated controls in top-of-the-range BMWs, is confident it works. Nuance are also planning to launch an “app” that uses voice-recognition technology to carry out web searches, although Google”s Android phones already 
have this feature.
                     








Read rest of entry

Friday, July 23, 2010

Create your own keyboard Shorcuts

You can create keyboard shortcuts to open programs. Before you get started, you need to create a shortcut for the program to which you want to assign a keyboard shortcut. To do this, open the folder that contains the program's executable file, right-click it, and then click Create Shortcut.


  1. Locate the shortcut to the program that you want to create a keyboard shortcut for.


  2. Right-click the shortcut, and then click Properties.


  3. In the Shortcut Properties dialog box, click theShortcut tab.


  4. Click in the Shortcut key box, press the key on your keyboard that you want to use in combination with Ctrl+Alt (keyboard shortcuts automatically start with Ctrl+Alt), and then click OKAdministrator permission required If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
    If you're using a program that also has a keyboard shortcut using the same key combination as the shortcut you just created, then your shortcut might not work.
Read rest of entry

Thursday, July 22, 2010

How to crop an image in photoshop

Cropping is one of the most basic editing techniques that can improve your images. Cropping helps to bring out the most important features in your image and focus the viewers’ attention on these features. Cropping also allows you to make your image a standard photo size.

There are several ways to crop images in Adobe Photoshop:
      1. Cropping with the Crop Tool
      2. Cropping to a specific size
      3. Cropping with the Marquee Tool

CROPPING WITH THE CROP TOOL


The Crop Tool allows you to make a precise selection of an image you wish to edit. To crop with the Crop Tool, follow these steps:

1. Open the image you wish to crop (see Getting Started for detailed instructions).
2. Select the Crop Tool from the Toolbox (see Selection Tools for location and description).
3. Click on your image once and drag the mouse out to make a cropping border.

4. Resize the border by dragging the squares at the sides and corners till you are satisfied with the way your image looks.

NOTE: You can also rotate your cropping border. Move the cursor outside the border, you will see how it turns into a double-headed arrow . Drag the arrows in the directions you wish to rotate your selection.

5. Once you are completely satisfied with your cropped image, press ENTER.

CROPPING TO A SPECIFIC SIZE

If you wish to print your digital photos or other images on standard size photo paper, you will have to crop your images to a specific size, such as 8x10. To crop an image to a specific size, do the following:

1. Open the image you wish to crop.
2. Select the Crop Tool from the Toolbox.
3. In the Options bar, specify the values for Width and Height
4. Click in your image and drag the cropping border. Notice that the border is con strained -you cannot make it wider or longer than the specified values (Figure 4). For example, if you entered 8 for Width and 10 for Height, whatever size you make the border, the area within it will fit on an 8x10 photo.

5. Once you are completely satisfied with your cropped image, press ENTER.

CROPPING WITH THE MARQUEE TOOL

If you are in a hurry and need just a simple crop, you can use the Marquee Tool and a menu command. To crop with the Marquee Tool, follow the steps below:
1. Open the image you wish to crop.
2. Select the Rectangular Marquee Tool from the Toolbox (see Selection Tools).
3. Click in your image and drag the mouse to draw a marquee around the area you wish to crop
4. In the main menu, go to Image > Crop (Fig. 6). The image will be immediately cropped.
Read rest of entry

Wednesday, July 21, 2010

How to Recover Hacked Email Accounts?

Email Hacked?It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.

For Gmail:

It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
If you cannot find success from the Step-1 then proceed to Step-2.
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link

For Yahoo and Hotmail:

Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option. 
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.
Read rest of entry

How to increase download speeds of µTorrent


uTorrent was very slow for me until recently I applied a few tweaks. Here’s what I did.

Note: Some of the settings mentioned below are optimized for 256k connection. If you want to calculate the optimal settings for your connection, check at the end of this tutorial. But I suggest you to read the entire tutorial for guidance on other settings.

Some Of The Settings are given here - 

First go to Options>Preferences>Network

1. Under ‘Port used for incomming connections’, enter any port number. It is best to use a port number above 10000. I use 45682.
2. Randomize port each time utorrent starts: UNCHECKED. I leave this unchecked because I have a router. If you do not have a router or a firewall, and want extra security,check this option.
3. Enable UPnP port mapping (Windows Xp or later only): UNCHECKED. I leave this unchecked because I have experienced it slowing down speeds. It is not needed if you manuallyport forward.
4. Add utorrent to Windows Firewall exceptions (Windows XP SP2 or later only): UNCHECKED (do this only if you have windows firewall disabled)
5. Global Maximum upload rate (kb/s): [0: unlimited]: 22 (for 256k connection)
6. Protocol Encryption: ENABLED. I would recommend everyone to enable this. This can help increase speeds with many ISPs.
7. Allow incoming Legacy Connections: CHECKED

network

Options>Preferences>Torrents


1. Global Maximum Number of Connections: 130 (for 256k connection)This number should not be set too low or the number of connections made to your torrents will be limited. Setting it too high may cause too much bandwidth to be used and can cause slowdowns.
2. Maximum Number of connected peers per torrent: 70 (for 256k connection)If you see that the peers connected to a specific torrent are exactly this number, or very close, increase this number to improve speeds.
3. Number of upload slots per torrent: 3 (for 256k connection)This depends on how much you want to upload to other users. Do not set too low or it may affect download speeds.
4. Use additional upload slots if upload speed <90%: CHECKED
5. Maximum number of active torrents: 2 (for 256k connection)
6. Maximum number of active downloads: 1 (for 256k connection)
7. Enable DHT Network: CHECKEDThis is recommended to be checked to improve speeds. More people will be available for sharing if this is checked.
8. Enable DHT for new torrents: CHECKED
9. Enable Peer Exchange: CHECKED
10. Enable scrapping: CHECKED
11. Pre-allocate all files: CHECKED
12. Append .!ut to incomplete files: UNCHECKED

torrent

Options>Preferences>Advanced


net.max_halfopen: 50
If you use Windows XP SP2, patch tcpip.sys with LvlLord’s Event ID 4226 Patcher to get better performance.
DO NOT CHANGE THIS OPTION unless you have Windows XP SP2 and have patched tcpip.sys.
You can also patch tcpip.sys with xp-Antispy

If you have a firewall
Open up the options/preferences/settings for the firewall – usually your firewall will have an icon to click in the taskbar
Look for the keywords “allow list” or “programs”
Add the application you want to give access to internet
Make sure to save your settings when you are done

If you have a router


1. Go to start>run>type cmd, press enter>type ipconfig, press enter
2. Remember both your ip address and your default gateway
3. Type in your default gateway into your default browser, a password prompt may come up. The default username and password are admin for my router
4. Under ‘Applications’ fill out one line for each p2p client you use
5. You need to use your ip address, the correct port range and set either tcp or udp
6. You can find and change the ports in the actual p2p client’s settings, just make sure they are the same in the router
7. Most p2p apps need both tcp and udp checked, if you are not sure check your p2p client’s FAQ
8. Save your settings.
Read rest of entry

MIT Media Labs Creates Invisible Mouse

Pranav Mistry at the MIT Media Lab created something cooler than the desktop laptop with the "invisible mouse".
            It uses "an infrared laser beam and infrared camera to capture hand movements and accurately translate them into computer commands". Pranav says" This is how the invisible mouse take commands. When the user moves his hand around the side of the desk within a certain area to move, the cursor on their computer will move, and mouse clicks are done by moving a finger, and then dragging by keeping that finger down."
            Mistry is not planning on mass-producing and selling this product. He does say that someone could build this device for a low price of just $20.
            So if you can get an IR camera and IR laser for that combination Price. it might not be difficult to figure out how. it works. All you need is some easy-to-read instructions.

Read rest of entry

Tuesday, July 13, 2010

Motorola Charm Officially Announced by T-Mobile

The Charm (until recently code named Project Basil) is the first Droid phone to feature a full QWERTY keyboard but is it really all that great?  Other than being sleek and stylish, this phone refuses to compromise its time-tested design to cash in on a fast-dying fad.  In short, yes!
With a 2.8 landscape screen in the front and a keyboard underneath, the Charm looks a lot like a Blackberry until you get it in your hands.  You see, the Charm cabbaged a unique design quirk from AT&T’s Backflip:  a touchpad mounted on the back!



Currently the device is running Droid 2.1 with Blur and sports a 3 megapixel camera—which clearly can’t compete with some of its other Droid kin.
However, unlike some of its other less-technically inclined Droid counterparts, the Charm rocks a noise cancelling microphone which will hopefully help with the poor call quality reported by some Droid Incredible users.
There’s been a lot of internet speculation about this particular phone since it was spotted in a T-Mobile “back to school” advertisement but apparently the company isn’t quite ready to come clean.  Not only was T-Mobile tight-lipped about a price, but they hesitated to give a concrete release date, opting instead to throw out the old “this summer” shtick—so keep your eyes peeled!
Read rest of entry
 

IT Tech Research Copyright © 2009 Gadget Blog is Designed by Ipietoon Sponsored by Online Business Journal