Computer Tutorials | Infotech | Software | Games | Ebook | Tips & Trick Blogger

Computer TRAINING

Computer TRAINING
English | Avi | Xvid | 800?600 | 14fps | 4:3 | 1031Kbps | Mp3 352Kbps 22050Kbps | 1.4Gb
Genre: Video Training

Must-Have for Computer Users who are familiar or not with basic and advanced features of a desktop or a laptop!This is a computer training session that was produced by Chris Hardwick using desktop sharing software. This is geared for everyone, from the new computer user through the intermediate and advanced user. All training is done with a Windows system. There are seven lessons for a total of 3.5 hours. See contents on next page.

Get Favicon of Any Site

Do you Like Favicon of Your Friend Site ?

Wanna Favicon just do this:


http://www.google.com/s2/favicons?domain=sitename.com


Replace: Sitename.com with any other site name

Enjoy!

Protect a Pen Drive with Rohos Mini Drive

The first thing we'll see how the method is to put a password to your pendrive.

What this program does is create a virtual partition on the pendrive, which is hidden until they run an executable file that is in the USB stick, and we asked a password to access the contents of the virtual partition.

This password is the one we have put to create a unit hidden in the pen, and that is what leaves the door open, leaving visible in Windows Explorer to our unit.

We will explain the process step by step to understand it better.

Create a hidden partition on a Pendrive:
* Once we have finished installing Rohos Mini Drive, open it and we went to set the USB key.


* It opens a window which will depart in 3 sections:


1: Path of the unity of origin Pendrive: Select the drive that corresponds to our memory stick.
2: Setting the partition to create the pendrive (leave the default)
3: Create password for Pendrive is the key we ask that the executable will create the pendrive in order to access their data.
* Once the program has finished creating the partition on the pendrive, appears in this image that shows the name of the new virtual disk (Disk F), which is the drive on which stores all content.


* Now click on disconnect and close the application.
* Open Pendrive and unity as we go beyond the data we had stored, an executable file called Rohos mini. If you execute it, we see an opening screen asking for the password to access the virtual drive F:


* By entering the password, look as it appears in Windows Explorer drive F, which is the virtual drive that we have to save protected documents created in the pendrive.


From here, every time you run your pen on any computer, only you can view the content of this unit using the password secret. So if someone grabs you borrowed your pen, you can not in any way accessing this information.

You can change the password from the program Rohos pendrive and also allows you to increase the capacity of the virtual drive, delete it, create backups, etc...

Download Rohos Mini Drive 1.19

S60 Programming A Tutorial Guide - Paul Coulton

Based on the authors' experiences in developing and teaching Symbian OS, this practical guide is perfect for programmers and provides a series of example-based scenarios that show how to develop Symbian applications. - Exercises walk the reader through the initial development of a console-based card game engine to a graphical user interface(GUI)-based, two player blackjack game operating over a Bluetooth connection between two mobile phones.

- Addresses how Symbian offers a number of different variants to allow for different user interfaces and screen savers - the most prevalent of these is S60
- Discusses how the move toward 3G technology has resulted in an increasing need for mobile application development for S60 devices.

Change Folder Background in Windows XP

Ever wanted to change background of image of some folders when you viewed them in your file browser? There is a simple hack available to do this.

CAUTION:
We takes no responsibility if this method doesn’t work as expected or causes any damage to your computer or data so try at your own risk.

First Step:
- Open Explorer window and go to folder you want to customize.
- Click on Tools > Folder Options
- In the View tab under Advanced Settings check the radio button that says Show hidden files and folders.


Folder options dialog box in windows xp
Click Apply and then Ok.

Second Step:
- Now in the folder, right click and select Properties.
- Properties dialog box would appear. Click on Customize tab there under customize menu click on Change icon button and select an icon for your folder.
- Press Ok.

Third Step:
- Previous process should have created a “desktop.ini” file in your folder.
- Sometimes this file remain invisible so if you can’t see it don’t worry it is there.
- Open this file with Notepad if the file is invisible go to folder and manually type desktop.ini in the filename field to open it.
- Add these lines of code in your “desktop. ini” file


[ExtShellFolderViews]
{BE098140-A513-11D0-A3A4-00C04FD706EC}={BE098140-A513-11D0-A3A4-00C04FD706EC}
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
IconArea_Image=C:\Windows\Greenstone.bmp

- In this code line IconArea_image tells your explorer window to display a background image. In this example we are using Greentone.bmp you can change it with your image and provide the path to that image.
- Save “desktop.ini” file.
- Refresh the folder.

Now u can see your favorite image in your desktop background.

Fresh RAM v5.0.0

One of the main conditions of comfortable work with computer is a fast response: applications should run in a second, files should be opened in a millisecond, most of functions should be performed immediately; and the fast response of the operative system in applications highly depends on the amount of free memory system can use.Fresh RAM is a software which can effectively improve the situation, optimizing the ways your system and applications are using memory, and, therefore, fastening entire work without any additional hardware expenses.

Fresh RAM has fast and complicated memory analysis algorithms under the hood; but the appearance of the software is simple, understandable and attractive: you always see the overall situation about your systemmemory , you can select analysis algorithm complexity (speed vs. effectiveness selection) and run optimizations; in a few minutes you’ll feel howfresh the air in your system is — all running things are running like a breeze! In addition, this application also includes several Microsoft Windows XP tweaks, which will help you optimize the performance of your computer.But that is not all!Fresh RAM takes memory optimization to the next level, and with version 5.0, we have also integrated customizable automatic memory optimization options as well as Process RAM Usage Identifier. The Process RAM Usage Identifier will help you understand which applications consume the mostmemory and how to control them, while the automatic memory optimization options will make sure that free memory is always available for when you need it the most.

Transfer Emails from One Gmail to Another Gmail Mailbox

If you have two gmail accounts and would like to stop using the old account, you probably will encounter the problem like how to import mails from the old gmail mailbox to another one. Gmail has provided a great feature that allows users to import emails from another mailbox so that you can still keep your important mails in the new gmail mailbox by following the below steps.

1. Login to old gmail account that you would like to transfer mails over to the new gmail account. Click on Setting, then choose Forwarding and POP/IMAP. Under POP Download section, select Enable POP from all mail. Click Save Changes button at bottom to save the setting.

2. Login to new gmail account. Click on Setting follow by Accounts. Under Get mail from other accounts section, click Add a mail account you own link.

3. At the pop up window, type your old gmail address and click Next Step button.

4. On the next screen, type the old gmail password, then select pop.gmail.com at POP server drop down list. Click Add Account button.

5. You will be asked if you want to send email from this new gmail mailbox using old gmail address. Tick Yes if you want to or else just tick No.

6. If you choose yes, then you will be requested to type your preference name for the old gmail address. If you would like to use old gmail address whenever reply an email from this new account, then click Specify a different “reply-to” address link and enter the old gmail address. Click Next Step button to proceed.

7. Click Send Verification button and gmail will send verification code to your old gmail account. This is to verify if you are the owner for old gmail account.

8. Go to your old gmail account, copy the verification code and paste it into the text box, then click Verify button.

Once you have completed all the above steps, your new gmail will start importing all mails from old gmail account. It will take some times to complete the mails transfer depending on your emails’ capacity.

Google's Body Browser is a Google Earth for Human Physiology

Google has mapped just about every traffic artery you could ever want to locate on Google Maps, but what if the thruway you’re looking for isn’t on any road atlas? To help you tell your axillary artery from your common carotid, Google has created a G-Maps-like search-able guide for the human body that lets you zoom, scroll, and search for every muscle, gland, nerve, bone, or organ in our common physiology.


As far as handy Web apps go, Body Browser is pretty neat; a sliding scroll bar allows you to peel away layers of the body, starting at the skin and moving down through the muscles and bone/organs to the cardiovascular and nervous systems. It allows you to zoom in tight (with nice resolution) to get the name of a specific bodily bit. Clicking on anything produces a handy label that identifies what you’re looking at.

Then there’s the search function of course, which allows you to locate any part of the body by just typing in the name. Like your usual Google search, the drop down is self-populating, so even if you’re not quite up to speed on the spelling of “anterior cruciate ligament,” the app will still help you find it. Perhaps best of all: no plug-ins. No Flash, no Java. The application runs right in any WebGL supported browser. It can still be a little cumbersome – if you’re not zoomed to exactly the right level in some cases (navigating the brain is a good example) it won’t always let you click on the right object – but overall it’s a pretty smooth experience.

Of course, not every browser is WebGL-enabled, but Chrome 9 Beta and Firefox 4 beta are, and both are available for download. Body Browser hasn’t landed in Google Labs just yet, but you can take it for a spin around your insides now through the Google Operating System blog. Barring that, you can get a somewhat rough tour via the video below



Source: http://www.popsci.com

Copy Protect 1.1.0

Copy Protect is a copy protection software program that lets you prevent illegal copying of your media files. The program supports most audio, video, document and picture file formats. Copy Protect works by converting your media files into executable applications that run only in the drive they are made for.

A copy protected file is useless and won’t run if copied and executed from another drive or computer, thus preventing illegal distribution. Copy Protect applies hard-core patent pending technology which ensures complete copy protection of your files.

Download here

Create Personal Drive on PC (Windows Only)

If want to have your personal folder in My Computer

Do this :

Go to c drive
Create a new folder (ex: Test)
Now go to command prompt and type :


subst h: c:\Test



now go to My Computer and check it..........

To remove the drive :

Go to command prompt and type :


subst h: /d



3 Ways Protect Your USB Pen Drive From Virus

Do you use a Pen-Drive for transferring data across different systems in your office/network, then there is a high possibility of virus infections for transferring across with the pen-drive as a medium.Here are collection of freeware tools that you could as your first line of defense before using your pen drive on other systems.

1. USB Write Protector

This freeware application prevents write access to a USB drives. This will protect USB drives from viruses, malwares, spywares etc.Using this tool you can just copy data from your pendrive to the system but not copy data into the pen drive from the client system.Its only 190 KB and works with XP with SP2.

Download

2. Portable Antivirus Solutions

# It is a standalone application, which means incase you want to copy a file to your pen drive, you will have to manually scan the file for infection using the tool.
# Update the virus signature from the regularly updated Virus Database directly from the USB.
# It also detects spyware.
# It takes about 25 MB after installation on to the USB drive.

Download

Dr. Web CureIt

In case the file you want to copy into your USB pendrive is infected with a virus, drweb-cureityou can try to cure/clean the infection from the file using DR. Web CureIT, An anti-virus and anti-spyware utility and works on windows 95 to Vista.You cannot update its definitions but instead download a new Dr.Web CureIt! package


Download

3. USB Firewall

USB Firewall automatically detects malicious autorun.inf file when an infected USB device is infected, you can also see what command are written in the autorun.inf file which launched the program and decide whether to let it run or delete the file and the file autorun.inf which launched it.

Disable Access to USB Flash Drive on PC

Step 1: Go to Start > Run > and type in regedit and press enter.

Step 2: Locate the following key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\USBSTOR


Step 3: Now on the right side double click on the value called Start & set it value to 4 & click OK.


Thats it. You have succesfully disabled access to the usb flash drive.

When you need to use your usb flash drive just change the value of Start to

3.If you're too lazy or newbie just copy & paste these codes into a notepad file and save it with a .reg extension.

Code to Disable access to the usb mass storage drive :
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\USBSTOR]
"Start"=dword:00000004

Code to Enable access to the usb mass storage drive :
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\USBSTOR]
"Start"=dword:00000003

[FSC] Naild - RELOADED (PC Game)

Nail'd is a racing game that is all about eschewing boring realism for over the top arcade fun. It's a racer that challenges everything from player reflexes through to the rules of physics. Riding on ATVs and motocross bikes with powerful boost controls, players will race down near-vertical courses of incredible jumps, stunts and obstacles. The brutal challenge of the Yosemite National Park is but one of the places they'll learn the meaning of verticality. Nail'd's single-player campaign features various configurable modes and races including Tournament, Time Attack and Quick Event. The multi-player mode allows players to compete head to head in a range of race-types with multiple mutators, locally or online. Earned points will determine a player's position on leader boards and based on the player's performance and ability to pull off stunning feats of speed and glory during each race, they'll unlock exciting new components to customize their vehicle.

Features:
* Different classes compete simultaneously on the same track
* Multiplayer - up to 12 players
* Extensive Online options - leaderboards, achievements
* Unique original soundtrack that brings across the vibe of the game, from members renowned bands such as Deftones, Fear Factory, Hatebreed or Static X, created specifically for nail'd
* 14 unforgettable tracks in 4 exciting locations

System Requirements:
o OS: Windows XP (with SP3)or Windows Vista (with SP1)
o Processor: Intel Pentium 4 3.2 Ghz, Intel Pentium D 2.66 Ghz, AMD Athlon 64 3500 or better
o Memory: 1 GB Windows XP / 2 GB Windows Vista
o Graphics: 256 MB DirectX 10.0? compliant video card or DirectX 9.0c? compliant card with Shader Model 3.0 or higher
o DirectX?: DirectX 9.0c or greater
o Hard Drive: 4GB
o Sound: DirectX 9.0c Compatible Sound Card

Install Note:
1. Unrar
2. Burn or mount the image
3. Install the game, use the keygen when asked for serial
4. Run the activator found in /crack
5. Play the game

Chat through CMD

What you need to chat through CMD? You need your friend's IP Address and Command Prompt.

Steps chat through CMD :

1. Open Notepad and write this code :


Quote:@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

2. Save this as "Messenger.Bat".

3. Open command prompt

4. Drag bat file over to Command Prompt and press Enter

5. This should came up










6. Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:










7. Now all you need to do is type your message and press Enter.

Enjoy.

Second Copy v8.0.3.0

Second Copy - an excellent program, designed for and intended for automation of data backup. It can backup your files on different drives, directories or networked computers. Second Copy checks the source files for changes and automatically updates the backup as needed. After a simple setup program running in the background and requires no user intervention. After installation, you'll always have your important data in the specified location!

Set a Video as Desktop Background

Do you want to set a Video as your desktop background instead of wallpaper?

Its very simple to impress your buddies by doing so... If you want set a video background, just follow this simple steps:

1. First of all you need a VLC player installed in your OS to perform this task. If not than download the VLC player from internet and install it.

2. Run VLC media player,go to Settings >> preferences >> Interface >> Main interfaces, then click on wxWidgets. Remove the tick on "Taskbar" and put a tick on "Systray icon".

3. Now go to Video >> Output Modules >> DirectX. On the bottom right put a tick on advanced options check box. You will now see some options. Put a tick on "Enable Wallpaper Mode".

4. Now, select playlist and put a check or tick on "Repeat current item".

5. Press the Save button. Now close the Vlc player and run it again (to save the settings permanently).

6. Now play any video you would like to set as Wallpaper. Right click on the video and click on "Wallpaper". The video would be set as your wallpaper!

Tux Walk 1.0

File Name: Tux Walk 1.0
Author: Zamaan's Software
Size: 2348 KB
Date Added: June 5, 2006

Have the Linux Penguin, Tux, walk around on your windows desktop! He is a little desktop pet that will keep you entertained by doing funny things.


Rohos Mini Drive 1.19

Rohos Mini Drive creates hidden and encrypted partition on the USB flash drive memory. You work with the files on the hidden partition without opening a special program. Those who have megabytes of sensitive files on the USB drive and seriously concerned with a data security, cannot imagine their USB stick without the hidden volume that is created using this tool.

Main Features:
* Creates a virtual encrypted partiton volume (disk) within a USB flash drive free space
* Automatically detects your USB stick config and creates encrypted partition
* Program does not require installation to work with encrypted partiton on a guest computer. You can start it right from USB drive
* Encrypted partition is protected by password
* Encryption is automatic and on-the-fly
* Encryption algorithm: AES 256 bit key lenght. NIST approved.
* Rohos Disk Browser to open encrypted partition without having Admin rights
* Virtual Keyboard - to protect your encrypted disk password from a key logger
* Autorun Folder. Saved program’s/file’s shortcut will automatically start/open up upon disk connection
* The limit of encrypted partition size is 2 GB

System requirements:
* Windows 2000/XP/2003/Vista
* USB 1.1/2.0 port
* USB flash drive or U3 Smart flash drive with 1 Mb or more free space

3 Ways to Open .PSD Files without Installing Adobe Photoshop

.PSD extension file stands for Photoshop Document and is related to the Adobe Photoshop application. The .PSD file works only in the Adobe Photoshop as it stores many imaging options available in Photoshop.

So if you like editing the images but do not want to spend lots of bucks on the software then this tip is surely for you and also because the following tools do not occupy huge memory as compared to Adobe Photoshop.

Method 1:
Paint.NET

We have written about this image editor before and it is a really cool image editor. But by default this can not edit the .PSD files. For that you will be requiring a plug-in that will make this tool to open and edit the .PSD files.
• First download and install Paint.NET
• Now download the psdplugin, unzip and copy the PhotoShop.dll to the “FileTypes” folder in the Paint.NET directory. By default it should be in C:\Program Files\Paint.NET\FileTypes.
Now you can open PSD files.

Download Paint.NET

Method 2:
IrfanView

IrfanView is a small, free and fast image viewer/converter that can open .PSD files easily.

Download IrfanView

Method 3:
GIMP

GIMP standing for GNU Image Manipulation Program is a free image retouching tool that supports .PSD files by default.

Download GIMP

Avast Internet Security v5.0.594 + CRACK VALID Till 2020

Core and detection

Image Antivirus and anti-spyware engine
State of the art scanning engine provides reliable protection against viruses, spyware and other forms of malicious software.

Real time anti-rootkit protection
Unique "on access" technology checks all kernel-mode drivers that the operating system is loading for signs of rootkit behavior. This enables even unknown rootkits to be detected and stopped before they can do any damage.

Image avast! Sandbox
Enables potentially exploitable programs (such as web browsers) and/or suspicious executables to be run in a safe, virtual environment. The avast! Sandbox is unique as it runs on both 32 and 64bit platforms.

avast! Community IQ
Most samples we process come from sensors deployed throughout the avast! community in the Behavior shield and anti-rootkit modules. This is a unique source of data made possible only thanks to our huge user base. Most of the collected samples are analysed by a number of automated processes and only a small fraction of the samples need to be processed manually by our virus analysts.

Image Code emulator
When a suspicious executable is encountered (during both on-demand and on-access scanning), avast! is able to emulate the program’s code in an isolated environment. The code emulator is used for two purposes. First, it is used for generic unpacking. Secondly, it is used in the heuristics engine. Technically, this is done using dynamic translation, a method much faster than traditional emulation techniques.

Image Heuristics engine
Starting with version 5.0, avast! features a new heuristics engine designed to proactively detect malware undetectable with normal definitions. The heuristics engine is able to cover both binary (executable) and script malware.

Potentially unwanted programs detection
5.0, avast! now detects potentially unwanted programs, such as remote admin tools and commercial key loggers. Custom rules can be set for dealing with these types of programs.

Additional Protection

Silent Firewall

The firewall enables you to control incoming and outgoing traffic from your computer. Protection is based on heuristic and behavioral analysis, and a white list of known safe applications. There are three network settings which can be changed depending on the type of connection.

Antispam
New comprehensive SPAM and fraudulent message filter. It works as a plug-in to MS Outlook and a generic POP3/IMAP4 proxy for other email clients.

Scanning


Boot-time scanner
Allows you to scan your computer for infections before the operating system has started and before a virus can be activated (32-bit operating systems only).

Command-line scanner
Enables you to run a scan directly from the command line.

Wake-up for scan
Microsoft Windows is woken from sleep or hibernation mode, performs a scheduled scan, then returns back to sleep mode.

Scheduled scanning
Allows users to define the scan time and files to be scanned.

Image avast! Intelligent Scanner
Can reduce the number of required file scans by up to 80% through a white list of proven safe applications. Files identified as safe are not rescanned unless they change.

Shields


Image Behavior Shield
Monitors activity on your computer using a number of sensors (file system, registry and network based) and reports/blocks any suspicious behavior.

Behavioral Honeypots
avast! sensors identify and monitor suspicious file activity on selected computers, automatically submitting files to the Virus Lab for additional analysis.

File System Shield
Real-time scanning of opened/executed files.

Mail Shield
Scans all incoming/outgoing e-mails for malware. For MS Outlook, a special plug-in is used. Other email clients are protected by a generic POP3/IMAP4/SMTP proxy. New in version 5, the proxy also supports scanning of SSL communication (gmail.com, sympatico.ca, ….)

Web Shield
Scans all visited web pages and checks all files, pages and java scripts downloaded from the internet. Thanks to the Intelligent Stream Scan feature, the Web shield doesn't slow down your web browsing.

P2P Shield
Checks files downloaded using P2P programs. - ABC, Ares, Azureus, BearShare, Bit Torrent, BitComet, BitLord, BitPump, CZDC++, Direct Connect, eDonkey, eMule, iDC++, iMesh, Kazaa, Kceasy, LimeWire, Morpheus, Opera's DC++, Overnet, Qtrax, Shareaza, SoulSeek, StrongDC++, uTorrent, Vuze, WinMX, Winny2, Zultrax.

IM Shield
Checks files downloaded while using instant messaging or “chat” programs. - AIM (AOL Instant Messenger), Gadu-Gadu, gaim/Pidgin, Google Talk, ICQ, IM2 Messenger, Infium, Miranda, mIRC, MSN/Windows Messenger, Odigo, PalTalk Messenger, Psi Jabber Client, QIP, QQ, SIM, Skype, Tlen, Trillian, WengoPhone, XFire, Yahoo! Messenger.

Network Shield
Provides protection against network-based viruses. The module has two main components: a URL blocker, designed to block malicious URLs (as defined by the Virus Lab), and a lightweight intrusion-detection system.

Script Shield
Detects malicious scripts hidden in internet web pages and prevents them from running and hijacking or potentially causing damage to your computer (Internet Explorer only, 32-bit only).

Updates


Smart virus definition updates
Incremental updating system minimizes the size of regular update files.

Image Fast application of updates
New format for the virus definition file speeds up application of updates into avast! 5.0 and reduces demand on CPU/memory, resulting in uninterrupted computer use.
New format for the virus definition file means faster updates and reduces demand on CPU/memory, resulting in uninterrupted computer use.

Gaming


Image New Silent/Gaming Mode
New Silent/Gaming Mode automatically detects full-screen applications and disables pop-ups and other on-screen notifications without degrading security.

Optimized for latest Intel Core i7 CPUs
Critical sections of the avast! scanning engine code have been optimized to deliver unrivaled performance on the latest Intel chips.

CPU optimization


Image Multi-threaded scanning optimization
avast! runs faster on new multi-core CPUs. A new avast! feature allows the splitting of large individual files between cores, accelerating the scanning process.

Green computing
Reduced demands on the disk drive result in lower energy consumption.
Miscellaneous

Miscellaneous


avast! iTrack
Real-time graphic scanning reports.
Image Graphical user interface
Easy to navigate graphical interface.

Automatic processing
Infected files are processed automatically without requiring user instructions.

System requirements
* Processor Pentium 3, 128 MB RAM, 100 MB of free hard disk space
* Microsoft Windows XP/Vista/7 (32/64 bit)

Make Firefox Really Fast

Fast loading web pages while surfing the Internet may have more to do with your web browser settings[/URL] and preferences than your Internet connection speed.
Try these easy Firefox tweaks and you’ll see that you’re surfing the Internet from 3 to 30 times faster!

To get started, open your Firefox web browser. In the address/location bar type [about:config] and then press your Enter key. (NOTE: DON’T TYPE THE BRACKETS.)


Tweak #1:

In the Filter bar type [network.http.pipelining]. Then, double-click on this line under Preference Name in order to change the value from false to true.


Tweak #2:

In the Filter bar type [network.http.pipelining.maxrequests]. Then, double-click on this line under Preference Name and change the value from 4 to a higher number anywhere from 10 to 30. I set mine to 30.


Tweak #3:

In the Filter bar type [network.http.proxy.pipelining]. Then, double-click on this line under Preference Name in order to change the value from false to true.


Tweak #4:

In the Filter bar type [network.dns.disableIPv6]. Then, double-click on this line under Preference Name in order to change the value from false to true.


Tweak #5:

In the Filter bar type [plugin.expose_full_path]. Then, double-click on this line under Preference Name in order to change the value from false to true.


Tweak #6:

In the Filter bar type [network.protocol-handler.external.ms-help]. Now, you are going to create a new Preference Name with an Integer Value. To do this, right-click on this line under Preference Name and select New, then Integer.


In the New Integer value box type in [nglayout.initialpaint.delay] and click OK. Then in the Enter Integer value box type [0] (that’s a zero) and click OK.


Tweak #7:

In the Filter bar again type [network.protocol-handler.external.ms-help]. Now, you are going to create another new Preference Name with an Integer Value. To do this, right-click on this line under Preference Name and select New, then Integer. In the New Integer value box type in [content.notify.backoffcount] and click OK. Then in the Enter Integer value box type [5] and click OK.


Tweak #8:

In the Filter bar again type [network.protocol-handler.external.ms-help]. Now, you are going to create another new Preference Name with an Integer Value. To do this, right-click on this line under Preference Name and select New, then Integer. In the New Integer value box type in [ui.submenuDelay] and click OK. Then in the Enter Integer value box type [0] (that’s a zero) and click OK.


Now, close your web browser and restart it. You’ll see how much faster web pages are loading. I sure did.
Let me know if these tweaks increase your Internet browsing speed. Know of any other tweaks or tricks? Let me know and I’ll add them.


Menangkal NetCut dengan Anti NetCut 2.0

Aplikasi NetCut barangkali sudah pernah dengar dengan aplikasi hack-nya. Memang sebenarnya NetCut bukan aplikasi software Hacking, tetapi kebanyakan Software NetCut digunakan untuk melakukan kejahatan, salah satunya untuk mengambil bandwidth disaat orang lain berada di area hotspot, walaupun juga mereka beralasan cuma iseng doang.

Anda yang gemar berinternet di area hotspot tidak perlu kawatir dengan ulah atau kemampuan dan kelebihan NetCut, karena ada penangkal aplikasi NetCut ini yang bisa Anda install dan Anda gunakan ketika merasa khawatir terserang NetCut di area hotspot. Salah satu aplikasi yang bisa untuk menangkal dari serangan NetCut adalah dengan menggunakan Anti NetCut. Dengan Anti NetCut jaringan hotspot yang Anda pakai akanlebih aman, karena jika para orang iseng menggunakan NetCut, Anda sudah siap sedia menangkalnya dengan Anti NetCut.

Untuk download software-nya silahkan klik
disini