............ Have a nice day............

Monday 30 September 2013

Mobogenie: Android Device Manager for Windows

Mobogenie is an all-in-one Android phone and Android tablet manager for your Windows PC. It makes managing Android devices a breeze. It lets you share files, contacts, gallery, apps and just anything between your PC and Android device. To connect your device with Mobogenie you must have USB Debugging enabled on your Android device and then Mobogenie will automatically connect with your Android Device.

Android Device Manager for Windows

MoboGenie Apps 400x293 Mobogenie: Android Device Manager for Windows
To start with, Mobogenie consists of the following tools that can be used to manage your device:

VLC Media Player 2.1.0 Rincewind: New features & revie

VLC Media Player, the best media player for Windows, has become even better with its 2.1 release named “Rincewind”. Bugs have been fixed, quality has been improved, and for sure new features have been added. Bugs have been fixed in large amounts and now VLC supports many new inputs and devices. VLC 2.1.0 is the first release to be officially get ported to iOS and Android, and partially to Windows Store App and Windows RT.
VLC 600x402 VLC Media Player 2.1.0 Rincewind: New features & review

New certificates for eMO, Epayment, Speednet and Accounts MIS clients except for R net communication.

After 29/09/2013 eMO, ePayment, speednet  and Accounts MIS Clients were not transmitting due to PTC Mysore certificate has been expired. 


   Solution: Solution provided by PTC Mysore.

   1. Download Attached Certificate issues.zip file from the link given below.
   2. Kindly register the certificate by double clicking on the file RegisterCACft.exe
   3.This certificate is not appicable for R NET COMMUNICATION.


DOWNLOAD

Fix: Recycle Bin is corrupted in Windows 8 | 7

If your Recycle Bin is corrupted, you can face various problems when using it.  The Recycle Bin may not show the files that you may have been deleted from your File Explorer, or you may be unable to delete the files in it – or even empty the Recycle Bin completely. At times you may even receive an Access Denied message.
In such a situation, you may need to repair or reset the Recycle Bin.

Recycle Bin is corrupted

Each drive on Windows, has a hidden and protected system folder called as $Recycle.bin. If you use the Unhide option from the Folder Options, you will be able to see this folder. When you delete files or folders from you desktop or any other folder, they are moved to the Recycle Bin folder for holding. But you may face a problem where your Recycle Bin gets corrupted and you have to repair or reset it.

Whatsapp for PC : How to use Whatsapp on PC ?

Whatsapp for PC : How to use Whatsapp on PC ?
Whatsapp is the most famous and the Best of Mobile messenger application through which you can send unlimited text messages, photos, videos etc. without paying any extra penny to your service provider.  All you need to have is a 3G, Edge or Wi-Fi enabled device. It supports most of the devices today such as the Androids, Windows phones, iOS, Blackberry, Symbian and selected Nokia Series 40 (S40) devices. But it is not available for PC. But one can use Whatsapp on PC. And this is what this article is all about i.e Whatsapp for PC / How to use Whatsapp on PC.
Before starting with the tutorial to use Whatsapp on PC you need to know a few things:
  • Make Sure that the number which you are going to use is not being used for Whatsapp on any other device.
  • Once you register a number on your PC, the next time to use it on some other device you need to verify it again. Thus, you need to verify the Phone number each and every time you use it for Whatsapp on some other device.
  • You need to have an active Internet Connection to use Whatsapp on your PC.

Sunday 29 September 2013

Top 10 Search Engines in the World

Top 10 Search Engines in the World
           Internet has evolved a long way from ARPANet to today’s world Internet. And the way people use it has also changed. Now there are Millions and Billions of websites on the Internet hosted throughout the world. But when you need to search something then you cannot open all websites. Here come search engines for our help. There are many search engines throughout the world. Here I am listing the Top 10 Search engines in the World.

Google Logo
1. Google: Google the world’s best Search Engine was founded by Larry Page and Sergey Brin when they studied in Stanford University. At first it was just a college project but later both of them launched it on the Internet in 1998 and from that time google has never looked back and evolved to be the world’s most visited website. And later many other services were added to Google such as Gmail, YouTube, Google Play etc.
Yahoo Logo
2. Yahoo! : Yahoo is the search engine which was somewhat comparable to Google a few years back. Yahoo is not only a search engine but it is also a news portal, shopping center, Mail Box, horoscope etc. Basically it is an All in One search engine ranging from news to fitness to Yahoo Answers and so on.

History of Malware

History of malware - The malware timeline
Malware is the term used for malicious software. Malware is software employed by its designer to cause impede a computer’s operation, collect information, or break into private computer systems. The many faces of malware include spyware, viruses, worms, and other destructive programs. Malware has been used for decades and continues to become more sophisticated as anti-virus software improves.
In 1971, a program called Creeper became the first known computer virus. Creeper infected machines on ARPANET. Creeper continues to inspire designers today.
In 1981, an invasive virus called Elk Cloner joined itself to the Apple DOS 3.3 operating system. It was created by a fifteen-year-old student who formatted the virus to travel from computer to computer via floppy disk. Infected computers would receive a message displayed on the screen on the fiftieth boot after their infection. The message was a short poem from the creator of the virus.

Saturday 28 September 2013

How do I clean a computer fan?


Dirty computer case fan

Cleaning a computer system fan, whether it is a CPU fan, case fan, or power supply fan, requires some care. It also requires the right product.
Warning: When cleaning a PC fan, it is best to make sure the fins of the fan do not spin. Keep the fins in place while using canned air, vacuum, duster, or cloth. This will help prevent damage to the fan and make it easier to remove the dust from the fan.
Canned air
The first option for cleaning computer fans, or any computer part in general, is by using canned air designed for electronics. This type of canned air is designed to be static free, helping prevent damage to computer components. Static can be hazardous to computers, causing damage and failure. Using canned air made for cleaning electronics is the safest approach, as well as the cheapest.

Macrorit Disk Scanner: Scan Hard Disk for Bad Sectors & Errors

What do you do when your Windows computer system starts showing error messages frequently? Where do you first look for the problem? Let me tell you, Windows disk scanner is the place to start from. Scanning your hard drive can help detecting and even correcting the most common hard drive errors.
Although, Windows computer systems come with a built-in disk error checking scanner scanner, that offers a lot of command line options to scan the drive for errors and bad sectors, I always prefer using a third-party tool for that. What I believe is that a third-party tool may provide you with better options and features.

Scan Hard Disk for Bad Sectors

Macrorit Disk Scanner Macrorit Disk Scanner: Scan Hard Disk for Bad Sectors & Errors

Tips to Shop Safely Online

safely shop online
Shopping online is becoming increasingly popular with consumers of all ages. With fast shipping and websites selling virtually everything, online shopping is an attractive alternative to the hassle of visiting multiple stores.

However, eCommerce safety is a huge issue, and many shoppers are unaware of how to ensure that their online transactions are safe, secure and private. Fortunately, there are a number of simple signs to look out for and changes you can implement to make purchasing items on the Web considerably safer.

The most common methods used by hackers to steal consumer information are phishing sites and emails. Hackers may set up websites that look similar to other branded sites and send emails to potential customers of those companies urging them to shop through special links. By gaining consumer trust through having a similar appearance to the original company’s website, hackers make consumers feel more comfortable about entering their details into such sites, including credit card information.

Enable Command Prompt Disabled by Administrator or Virus

Command Prompt is the tool in Windows which allows users to interact with their computer from a character user interface(CUI). It allows users to bypass most restrictions that are enforced on the Windows explorer based GUI. Hence, it can also be used to remove viruses and malware and also undo their effects. To avoid this, most viruses disable command prompt. Some administrators also purposefully disable it to avoid users changing critical settings of the computer.

In these situations, if you run the command prompt (cmd.exe), you will get an error saying "The command prompt has been disabled by your Administrator". However, there are ways in which you can re-enable it. This article contains some such few simple techniques using which you can easily enable the command prompt.

Enable Command Prompt

Enable Command Prompt using the Group Policy Editor

Scroll the mouse continuously

If you want to scroll a page or document without having to use the scroll bar or keyboard, get a mouse with a middle scroll wheel that can be used as a button. A mouse with a scroll wheel allows you to scroll up or down a page by moving the wheel up or down. However, the mouse will also have a feature that allows for automatic scrolling depending on the program you're using.
Mouse auto scroll cursors
To use auto scrolling click using the scroll wheel by pushing in on the wheel in a blank or empty portion of the screen. Once clicked one of the three scrolling cursor icons (shown to the right) will be shown depending on the program you're using. If the program does not display a cursor icon, it does not support any type of continuous scroll.
Move the mouse in the direction you want to scroll. The speed of the automatic scrolling can be adjusted based on the distance from the scrolling icon you move the mouse cursor. The farther away you move the cursor, the faster the scrolling.
The automatic scrolling can be very useful for reading a large document or scrolling through a large amount of data, in the case of a spreadsheet. Setting a slow scroll speed can allow for hands-free, effortless reading or data browsing.

Friday 27 September 2013

What is the difference between a 32-bit and 64-bit CPU?

The two main categories of processors are 32-bit and 64-bit. The type of processor a computer has not only affects it's overall performance, but it can also dictate what type of software it uses.
32-bit processor
The 32-bit processor was the primary processor used in all computers until the early 1990s. Intel pentium processors and early AMD processors were 32-bit processors. The Operating System and software on a computer with a 32-bit processor is also 32-bit based, in that they work with data units that are 32 bits wide. Windows 95, 98, and XP are all 32-bit operating systems that were common on computers with 32-bit processors.
64-bit processor
The 64-bit computer has been around 1961 when IBM created the IBM 7030 Stretch supercomputer. However, it was not put into use in home computers until the early 2000s. Microsoft released a 64-bit version of Windows XP to be used on computers with a 64-bit processor. Windows Vista, Windows 7, and Windows 8 also come in 64-bit versions. Other software has been developed that is designed to run on a 64-bit computer, which are 64-bit based as well, in that they work with data units that are 64 bits wide.

How to protect your eyes when using a computer

When using a computer for prolonged periods of time, whether for work or pleasure, it's important to protect your eyes from long-term damage. There are a number of things you can do to help protect your eyes. Some of those ways are:
  • Clean your computer screen periodically to remove any dust, dirt or fingerprints. This can make it easier on your eyes, so they are not having to focus harder to see what is on the screen, especially if there is text to read.
  • Keep the monitor about 20 to 30 inches away from your face. This range has been found to be the best distance for proper viewing and for reducing eye strain.
  • Use fonts and icon sizes that are easy for you to view and read. Avoid using small fonts and icon sizes as it can cause eye strain.
  • Adjust the height of the monitor so that the top of the monitor is just below your eye level so that you are looking down slightly when viewing the screen.
  • Make sure there is proper lighting in the room. Overly dim lighting or overly bright lighting can cause strain to your eyes.
  • Use an anti-glare filter on your monitor, to help prevent glare and reflection from lights in the room.
  • Use a document holder for placing documents that you look at regularly, and place it at the same distance as the monitor.

Top 10 unknown Google tricks



Below is a list of our top ten Google tricks many people who use Google don't know about.
Definitions
Pull up the definition of the word by typing define followed by the word you want the definition for. For example, typing: define bravura would display the definition of that word.
Local search
Visit Google Local enter the area you want to search and the keyword of the place you want to find. For example, typing: restaurant at the above link would display local restaurants.
Phone number lookup
Enter a full phone number with area code to display the name and address associated with that phone number.

Thursday 26 September 2013

Evernote 5 for Windows PC: Review & Download

Evernote is not the same Evernote application as it was before! Evernote Corporation has redesigned the app’s user interface from the scratch in a bid to improve the overall user experience. The reworked application for desktop is now ready for use and lands on your PC with many useful features such as Reminders, Improved Notes , Shortcuts, smarter searching and more.
Evernote for Windows Desktop 600x375 Evernote 5 for Windows PC: Review & Download
The cloud-based note-taking tool has opted for a flat interface this time. The biggest difference is readily visible in the form of notes displayed in the Note List. The Notes section within the left panel displays all the notes you have access to in a single list. Also, the desktop version for Windows has made the task of creating notes and browse simultaneously, easy. Elements that might distract the user have been stripped off.

Evernote 5 for Windows

Wednesday 25 September 2013

7th Pay Commission for central govt employees announced



New DelhiPrime Minister Manmohan Singh today approved the constitution of the 7th Pay Commission, which is likely to impact at least 85 lakh central government employees and pensioners.

"Its (7th Pay Commission's) recommendations are likely to be implemented with effect from January 1, 2016," Finance Minister P. Chidambaram said in a statement.

The setting up of the Commission comes ahead of the Assembly elections in five states this year and the general elections next year.

The government constitutes Pay Commission every 10 years to revise the pay scales of its employees and often these are adopted by states after some modification.

Sunday 22 September 2013

Add items & Customize Send To Menu in Windows 8 | 7

The Send To Menu in Windows 8, Windows 7 or earlier, lets you send files easily to various destinations. If you like to send your files to a particular destination folder regularly, or if you find that your Windows has added too many places to ‘Send To’ of your right-click context menu, you might just want to add or delete a few items from this Send To menu.
send to menu windows 400x369 Add items & Customize Send To Menu in Windows 8 | 7

Customize Send To Menu in Windows

Saturday 21 September 2013

Publish a Blog post using Microsoft Word 2013

To setup the Blog Post in your Word go to File and click on New.
063013 2135 HowtoPublis1 How to Publish a Blog post using Microsoft Word 2013
There you’ll find Blog Post. Select Blog Post and click on Create.

Fix: Failed To Read Description. Error Code 2 For Background Services In Windows

Windows runs a number of services in the background. You can find these background services with their current status in Services window (Press Windows + R, type services.msc and hit Enter). These services are also seen in a separate tab, under the hood of System Configuration Utility (commonly known as msconfig). Today, I came around a weird issue for the background services running in the Services window. Against each service, the status says “Failed to Read Description. Error Code 2″. Have a look at the following screenshot:
Services.MSC Failed To Read Description Error Code 2 Fix: Failed To Read Description. Error Code 2 For Background Services In Windows
Since there is error code 2, it can be concluded that background services files were missing from the system. The first and foremost thing I did after seeing the error, I just checked the  necessary files for the services. So it was everything OK with my system. 
Now, I started by troubleshooting steps in another direction, and finally ended up all this mess with following solution:

Failed To Read Description. Error Code 2


Free Chat Encryption Software for Windows

Chatting on social networks lik Facebook, Google Services is too mainstream these days but have you ever thought of your privacy and security with such services? Some of these services have overlooked your privacy, but privacy is a must and everyone should have be aware of it. Today we’ve reviewed some free chat encryption software that provide you with an encrypted chatting platform with the best possible security.

Free Chat Encryption Software

Cryptocat

cryptocat 400x286 Free Chat Encryption Software for Windows
Cryptocat is a free browser extension that lets you chat securely with your friends or colleagues. It is very easy to use and gives you best of security and privacy. It is basically an open sourced encrypted instant messaging platform. It works basically on the principle of chat rooms. You can connect with a conversation, else it will be automatically created for you, which you can share with people, so that they can join and start chatting. You can have a group chat or you can click on any of the member to start a private chat.
Cryptocat is a useful extension and it is simple and easy to use too. Click here to download Cryptocat. It is available for Chrome,Firefox and Safari.

File Fisher: Freeware to copy or move particular file types from a mixed bunch

Sometimes copying or moving files can be very annoying. One of the most common problems while working on the computer is the slower copying or moving files speed, especially when transferring big files. If you regularly transfer a large amount of files and want to speed up your copying or moving files speed, File Fisher is the right software that can help you to transfer your files quickly. It is highly reliable and handy software. What you all need to do is to select the source and destination folder, the rest of the task is handled by the software itself. Since it is a light weighted software, it doesn’t put much pressure on your system as well.
File Fisher 1 File Fisher: Freeware to copy or move particular file types from a mixed bunch
Lets say you want to copy all the images, which are mixed with other files like music or documents, from one folder to another location. Simply drag and drop the source and destination folders and specify which file types you need to copy or move. Hit Start and the freeware will segregate the files and copy or move them for you.

Fotosizer: Free Batch Image Resizer Software for Windows

High resolution images taken from DSLR camera take a lot of time to share or upload; especially via email. Many a times receiving or sending images via email allows low resolution images so they load faster and are suitable for mailing.Fotosizer is a free batch image resizer software that helps you to re-size your images in few minutes with multiple effects. You can re-size a single image or a whole folder of images at one go without hampering the image quality.

Fotosizer review

11 Fotosizer: Free Batch Image Resizer Software for Windows
With Fotosizer image resizer software, you can easily upload the images to any website. You can even share it with any other device. This software supports multiple output formats, including TIFF, PNG, GIF, JPEG, and BMP.
Key Features of Fotosizer:

Thursday 19 September 2013

Secure your USB with Phrozen Safe USB

Phrozen Safe USB

Using Phrozen Safe USB is simple. All you need to is visit the official website and hit the download link given there for downloading the software. It takes a while for the download to complete. Once the download is complete, you will see an icon on your computer screen.
Phrozen safe USB Secure your USB with Phrozen Safe USB
Double click the icon to launch Phrozen Safe USB. When done, a settings window should appear.
USB devices 3 mode Secure your USB with Phrozen Safe USB
This is the main window of the program as it allows you to configure all the options/ status for a USB. If you see, it displays 3 main options,

Fully Operational Mode (FOM)

The mode is set as the default mode. User has the freedom to copy, modify, move or delete files as normal, i.e. he can perform normal operations while the USB is inserted.

Read Only Mode (ROM)

This mode just allows you to read contents of a USB. You cannot modify, transfer or delete the stored data. So, there is no chance of a virus/ malware infection getting spread to your computer.

Disabled Mode

This mode completely deactivates the USB detection ability by Windows. In this mode you do not see USB Storage devices plugged in message, even if the device is inserted. It is in stealth mode. It can be turned on/activated when you would not like anyone to be exporting important data or importing harmful content from your computer to USB Key.
USB devices deactivated 400x289 Secure your USB with Phrozen Safe USB
You can make Phrozen Safe USB’s functionality available via right-click system tray menu too. On a personal note, you will find one feature missing in this freeware – ‘PASSWORD PROTECTION’. However, the developer is already working on integrating this feature, soon.

Phrozen Safe USB free download

Download link: Phrozen Safe USB.

Wednesday 18 September 2013

System Ninja: Free system optimization software for Windows 7 | 8

System Ninja review

Upon launching System Ninja, one can notice that the tool interface is split up into four sections. Firstly, there’s a Junk Scanner tab that greets you on startup. Second comes System tools, and then PC Analysis and lastly modest Options screen.
Junk Cleaner
This module thoroughly scans your system for junk files or ones left over by certain programs. Once the system scanning is complete, you can delete a files or ignore them.
Junk file cleaner System Ninja: Free system optimization software for Windows 7 | 8
Files that can be deleted include,
  1. Windows Temporary files
  2. Thumbs.db files, and other thumbnail caches.
  3. .tmp files, in all directories
  4. Game caches
  5. Windows Logs
  6. Common Torrent Tags

SUPERAntiSpyware Review: Free spyware & malware removal security software for Windows

Computer security has become an important concern among internet users over a past few decades. The malware landscape is huge today, and the worst part is that it’s getting worse every day. Various complex security threats and their infection mechanisms are affecting the computer system nowadays and we need something which can detect and remove the nastiest malware from the system.superantispyware revieww 600x508 SUPERAntiSpyware Review: Free spyware & malware removal security software for Windows

Monday 16 September 2013

SecureAPlus – A second line of defense against Malware

Today, computer users always face the risk of new generation Malware that attack us even when we may have a good antivirus installed. There are new Malware releasing everyday, and it’s getting harder for antivirus solutions to release virus signature based on the new Malware and then detect it. However careful you may be, there is still a chance you may get hit by a powerful Malware that may steal your sensitive data or even crash you computer. So that’s where SecureAge SecureAPlus can come into the picture to help you.
image thumb3 SecureAPlus – A second line of defense against Malware

Macrorit Disk Partition Expert: Free Disk Management Software for Windows

Macrorit Disk Partition Expert is a new powerful disk management software with a lot of options. Like any other Disk management software Macrorit Disk Partition Expert also has the ability to extend partition, especially for the system drive. The main reason to extend the partition is to avoid low disk space problem. While many may prefer to use the in-built Disk Management Tool, there are some who may want to use a third party disk management software offering more features. Macrorit Disk Partition Expert is the new kid on the block!

Macrorit Disk Partition Expert

Some of the main features of Macrorit Disk Partition Expert areResize/Move, Create, Delete, Format, Set Active, Hide/Unhide, Change Label, Change Drive Letter, Explore, View Props, Check, Defragment, wipe, Surface test. Macrorit Disk Partition Expert also claims to have an unprecedented fast working speed. It claims to have the best datamovingalgorithm which is 300% faster than other partition software with least CPU resources.
mc 400x303 Macrorit Disk Partition Expert: Free Disk Management Software for Windows
With Macrorit Disk Partition Expert you can delete, move or shrink partition without losing any data. It’s very easy to do it. What you need to do is first select the drive you want to resize and right-click, then select Move/Resize. Once you do that you’ll get a pop up Window with options to resize the drive. It’s pretty neat and easy to do.

Full form of computer terms:

 *HTTP - Hyper Text Transfer Protocol.
* HTTPS - Hyper Text Transfer Protocol Secure.
* IP - Internet Protocol.
* URL - Uniform Resource Locator.
* USB - Universal Serial Bus.
* VIRUS - Vital Information Resource Under Seized.
* 3G - 3rd Generation.
* GSM - Global System for Mobile Communication.
* CDMA - Code Divison Multiple Access.
* UMTS - Universal Mobile Telecommunication System.
* SIM - Subscriber Identity Module.
* AVI = Audio Video Interleave
* RTS = Real Time Streaming
* SIS = Symbian OS Installer File
* AMR = Adaptive Multi-Rate Codec
* JAD = Java Application Descriptor
* JAR = Java Archive
* JAD = Java Application Descriptor
* 3GPP = 3rd Generation Partnership Project
* 3GP = 3rd Generation Project
* MP3 = MPEG player lll
* MP4 = MPEG-4 video file
* AAC = Advanced Audio Coding
* GIF = Graphic InterchangeableFormat
* JPEG = Joint Photographic ExpertGroup
* BMP = Bitmap
* SWF = Shock Wave Flash
* WMV = Windows Media Video
* WMA = Windows Media Audio
* WAV = Waveform Audio
* PNG = Portable Network Graphics
* DOC = Document (Microsoft Corporation)
* PDF = Portable Document Format
* M3G = Mobile 3D Graphics
* M4A = MPEG-4 Audio File
* NTH = Nokia Theme (series 40)
* THM = Themes (Sony Ericsson)
* MMF = Synthetic Music Mobile Application File
* NRT = Nokia Ringtone
* XMF = Extensible Music File
* WBMP = Wireless Bitmap Image
* DVX = DivX Video
* HTML = Hyper Text Markup Language
* WML = Wireless Markup Language
* CD - Compact Disk.
* DVD - Digital Versatile Disk.
* CRT - Cathode Ray Tube.
* DAT - Digital Audio Tape.
* DOS - Disk Operating System.
* GUI - Graphical User Interface.
* HTTP - Hyper Text Transfer Protocol.
* IP - Internet Protocol.
* ISP - Internet Service Provider.
* TCP - Transmission Control Protocol.
* UPS - UninterruptiblePower Supply.
* HSDPA - High Speed Downlink Packet Access.
* EDGE - Enhanced Data Rate for GSM [Global System for Mobile Communication] Evolution.
* VHF - Very High Frequency.
* UHF - Ultra High Frequency.
* GPRS - General Packet Radio Service.
* WAP - Wireless Application Protocol.
* TCP - Transmission Control Protocol .
* ARPANET - Advanced Research Project Agency Network.
* IBM - International Business Machines.
* HP - Hewlett Packard.
* AM/FM - Amplitude/ Frequency Modulation.
* WLAN - Wireless Local Area Network.


Courtesy: http://sapost.blogspot.in

F-Secure launches Safe Twiit to scan Twitter links

Twitter  is proven to be vulnerable to hacking attempts every now and then. Seeing the increasing internet vulnerabilities and the dubious links being shared on this popular social site, F-Secure has launched a new tool to scan Twitter links. The tool named Safe Twiit will check the last 30 tweets posted on your timeline and mention if they are safe or not.SAFE TWIIT

Saturday 14 September 2013

Convert FAT32 to NTFS Without Formatting or Losing Data


You have a flash drive or probably an external hard drive that currently has FAT32 file system and you want to change it to NTFS, because FAT32 does not support handling large files (over 4GB) or it is just simply old for your taste but there is just one problem, you don't want to lose your saved data. This article is for you then as it explains exactly how you can achieve seamless transition from FAT to NTFS without involving any data loss.


FAT32 to NTFS


While it is generally recommended to use the NTFS file system because of its stability, security and lesser defragmentation time, most of us end up using FAT32 because that is what most disks are preformatted with. Unless, we notice the “Not enough disk space error” despite disk space being available, we don't bother to change the file system. Moreover, most of us don't change it because of the risk of losing important data and lack of time (read laziness). As Microsoft was aware of this scenario, they added a capability in the command prompt to overcome this by executing a simple command. There are many software that support this too but the Convert command is one of the easiest ways to do so. Follow the steps below to know how:-

Lock your Fields in MS Word!

Word
As you know from previous posts, fields are used frequently in MS Word documents. Often, fields in your document are updated automatically when you make edits to your document or print it. There can be instances though, when you may not want a field to be updated.

Follow the steps below to learn how to lock a field in your document:
  1. Select the field in your document you would like to lock.
  2. Click Shift + F9 to update your field, if you like.
  3. Click Ctrl + F11.
Should you decide to unlock your field at a later date,  follow these steps:
  1. Select the field you would like to unlock.
  2. Click Ctrl + Shift + F11.

AVG launches PrivacyFix Privacy Settings app for Crowd Control at social sites

The ever-increasing traffic on social sites means that users will be uploading more personal information in the form of pictures, whereabouts, work profiles, relationship status, etc. onto the internet. More the information, the greater would be the risk that you face of it being seen by somebody whom you do not intend to share. Today, in such a scenario, it is almost a necessity that you have utmost control of your online data by knowing your privacy settings on sites such as FacebookGoogle or LinkedIn.
privacy settings
Thinking of a solution? AVG PrivacyFix is an application launched by AVG that aims to allow users take charge of their privacy settings for their social accounts so as to make them safer and being exposed to others.

DBAnalyzer for Sanchay Post dated 13.09.2013

DOWNLOAD

Speed Net 4.0 released by CEPT

Pre-requisites:
1) Hardware: Mininum Pentium IV CPU with 2GHz speed, 1GB RAM and 1 GB free Hard Disk space.

2) Operating System: Minimum Windows XP SP2 or higher.

3) Database: Minimum SQL Server 2000 or higher.

4) Application Software:
a) SpeedNet Server Version 3.1.
b)
(i) SpeedNet Client Version 3.1.2 Update 6 Release date: 01/10/2012
OR
(ii) SpeedNet Client Version 3.2 Beta (Released to Sorting / IC Hubs for Bulk Delivery)
OR
(iii) SpeedNet Client Version 4.0 (Released for testing of SP-COD and BRSP)
c) For Post Offices: Update 8 to Meghdoot 7.0 (for SP-COD operations)

5) Other Requirements:
a) .Net Framework 2.0 or higher.
b) Windows Installer 3.1 or higher



DOWNLOAD

Meghdoot 7 update 8 Released



Updates available for the following modules:
ü Point of Sale
ü Despatch
ü eMO
ü ePayment
ü Postman
ü Accounts
ü AccountsPBS (Schedules)
ü Sub Accounts        
ü Treasury
ü AccountsMIS
ü RNet Communication


DOWNLOAD