Wednesday, July 2, 2008

Mobile 3GP to AVI converter


Do you want to converrt your mobile 3gp videos to AVI?

The Mobile 3GP converter makes use of "3GPtoRawAVI" converter to convert 3GP files (3rd Generation Partnership Project, *.3gp) to uncompressed AVI files (*.avi) in a user-friendly way. The 3GP video files must have audio in order to be converted. The program offers two modes, one for single file conversion and a second for multiple files conversion for converting many 3GP files at once. In a single file conversion you can to convert only the audio, only the video or both.

Download the Mobile 3GP to AVI converter

How Your Mobile Phone can Help you in emergencies

There are a few things that can be done in times of grave emergencies. Your mobile phone can actually be a life saver or an emergency tool for survival. Check out the things that you can do with it:

1. Emergency

The Emergency Number worldwide for Mobile is 112. If you find yourself out of the coverage area of your mobile; network and there is an emergency, dial 112 and the mobile will search any existing network to establish the emergency number for you, and interestingly this number 112 can be dialed even if the keypad is locked. Try it out.

999 for UK.
100 for India
911 for US. Actually 911 can be dialed on all phones

Also in Australia , the Australian emergency number 000 can be dialled whilst your mobile phone keyboard is locked. This is another reason why 000 receives so many false emergency calls!

2. Have you locked your keys in the car?

Does your car have remote keyless entry? This may come in handy someday. Good reason to own a cell phone: If you lock your keys in the car and the spare keys are at home, call someone at home on their mobile phone from your cell phone.

Hold your cell phone about a foot from your car door and have the person at your home press the unlock button, holding it near the mobile phone on their end. Your car will unlock. Saves someone from having to drive your keys to you. Distance is no object. You could be hundreds of miles away, and if you can reach someone who has the other "remote" for your car, you can unlock the doors (or the trunk).

Editors Note: It works fine! We tried it out and it unlocked our car over a mobile phone!"

3. Hidden Battery Power

Imagine your mobile battery is very low. To activate, press the keys *3370# Your mobile will restart with this reserve and the instrument will show a 50% increase in battery. This reserve will get charged when you charge your mobile next time.

4. How to disable a STOLEN mobile phone?

To check your Mobile phone's serial number, key in the following digits on your phone!:

star-hash-zero-six-hash

* # 0 6 #

A 15 digit code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere safe. When your phone get stolen, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless. You probably won't get your phone back, but at least you know that whoever stole it can't use/sell it either. If everybody does this, there would be no point in people stealing mobile phones.

Not only the above, but also in Australia your stolen phone is added to a "Stolen Mobile Phone" database, so if your phone is found later on it can be returned to you

Windows XP-Tips and tricks

Here are some hidden features of Windows XP and how you can utilize them:

Hidden Command Line Switch
Instructions - Go to "Start", "Run" and Type defrag c: -b to defragment the Boot and Application Prefetch information.


Hidden Install Creator
Instructions - Go to Start, Run, type iexpress


Hidden Internet Conference Application
Instructions - Go to Start, Run, type conf



Create a Log File
Instructions - Launch Notepad, Type .LOG on the first line, and then press Enter to move to the next line. On the File menu, click Save As, type a descriptive name for your file in the File name box, and then click OK. When you next open the file, note that the date and time have been appended to the end of the log, immediately preceding the place where new text can be added. You can use this functionality to automatically add the current date and time to each log entry.


Image Trails
Instructions - Open an image and hold down Shift then drag the image around to create an image trail.

10x Zoom
Instructions - Open an image and select the magnifying glass icon. Left-Click exactly on the line below the 8x.

Hidden Font Editor
Instructions - Go to Start, Run, type eudcedit


Hidden Windows Media Player
Instructions - Go to Start, Run, type mplayer2

Audacity-Free sound recorder and audio editor


Audacity is an open source audio editing software which works on almost all operating systems including Linux, Mac, windows etc.

Features:
*Can record from microphones or any other source, there is no time limit.
*Simple to edit interface, thus it easy to combine or split audio files.
*Job gets performed at a quick pace.
*Alters the pitch without altering the tempo, or vice-versa.
*Remove static, hiss, hum, or other constant background noises.

Download Audacity

Saturday, February 9, 2008

How to Restart Windows without restarting the computer


Restarting Windows without Restarting the Computer:
When you click on the SHUTDOWN button, make sure to simultaneously press SHIFT Button.
If you hold the Shift key down while clicking on SHUTDOWN button, you computer would restart without restarting the Computer. You can also call it "HOT REBOOT".

Test Your AntiVirus Software, Antivirus software test

Creating A Test Virus:

Have you ever doubted if your anti-virus software is actually working? Would you like to see what happens when it detects a virus? Let us take an antivirus software test that doesn't need you to have a real virus.

First, open Notepad. Then copy and paste into it the text on the line below. (It must all be on one line.)

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

Then select File, Save, select All Files for the file type, then save the file as eicar.com.

Your anti-virus software may stop you from saving the file as eicar.com, which is an indication that it is working effectively. If your antivirus software doesn't raise an alert, try scanning the folder where you saved eicar.com. To see what happens if you try to run a file containing a virus, double-click eicar.com to open it.

Explanation:

The file eicar.com you have created is completely safe. It is not a virus. It is a standard
antivirus software test file developed by the European Institute for Computer Anti-virus Research (EICAR). All anti-virus products are programmed to detect this file as if it was a real virus. Therefore you can safely exercise it to test whether your anti-virus software works, without being afraid of whether it will actually harm your computer.

Conclusion:

If your anti-virus product should fail to stop you from running the file, it will just display the text "EICAR-STANDARD-ANTIVIRUS-TEST-FILE" in a DOS box. No damage will have been done, but you should perhaps consider using a better anti-virus product or antivirus software, because if it had been an actual virus, your computer system would by now be infected!

Sunday, December 9, 2007

Delete spyware now ..Remove Spyware from your computer

Two main groups of Spyware are Adware and Malware . The most common form of spyware is
Adware. The main function of an adware program is to capture data from your computer for targeted advertising. Adware is usually just an irritation, but sometimes it can cause greater difficulties.

The lesser common spyware program is called Malware. Malware is a program that is known to wreak havoc with your computer. Malware include viruses, Trojan horses, and certain kinds of hijacking spyware. These forms of spyware are programmed to retrieve personal information like online transaction passwords, internet banking passwords, email passwords, credit card numbers, and social security numbers for fraud. Many of spyware can alter default program settings to make an attacker access to the computer, or monitor a user’s regular websurfing habits to get information The information is then sent off to the criminal with the help of an email without user knowledge or intervention. People who download peer to peer software online have a higher amount of chances for their computer to be infected by spyware.

It's hard to tell the share of computers that have been infected with spyware, estimates run as high as 95% computers could be infected. Children online can be especially vulnerable because they may have less technical savvy and frequently download using peer to peer software from the Internet.

Spyware ads are in the form of pornographic ads which pop up everytime you surf; there can also be annoying pop ups that spring up everytime you open or close a website. Some spyware can use up your computer’s RAM and CPU making them run programs even when your computer is not required to. Spyware can alter the browser's homepage and other settings without the user's permission like turning of the PC security and firewall protection making your system to be attacked from harmful virues.



Simple Steps for Removing Spyware from Your Computer

Restart computer in Safe Mode(with Networking). Here’s how you can restart Computer in Safe Mode :
Some computers have a progress bar that points to the word BIOS. As soon as the BIOS begins toload, begin tapping the F8 key on your keyboard. Do this till the Windows Advanced Options menu appears. If you begin tapping the F8 key too soon, some computers displays a “keyboard error’ message. If such a thing happens, restart the computer and try again. Using the arrow keys on the keyboard, choose Safe mode (with Networking)


Download the anti spyware CWShredder and save it to your Desktop.
Download the anti spyware Spybot - Search & Destroy install and run it
Download the best anti spyware Ad-Aware and install it. Make sure you click on check for updates before scanning
Download HijackThis from here


CWShredder (Freeware) CWShredder detects and removes traces of CoolWebSearch. CoolWebSearch is a term given to a wide range of different browser hijackers. Though the code is very different between variants, they are all used to redirect users to coolwebsearch.com and other sites affiliated with its operators.
The CoolWebSearch Trojan can install manyin Favourites, mostly to porn sites on your desktop; it also adds toolbar to Internet Explorer and alters your home page without your permisson. and it also significantly slows down the performance of your computer, and it may cause Windows to reboot or crash intermittently.