Thursday, April 8, 2010

when you open the page then show alart Message box


Ager aap chahte hain k jab bhi koi bhi visiter aap ka blog ya aap ki web site open keray to sab se pehlay os visiter ko aap ka welcome message milay jo k front pe show hona chahiye to aap is type ka Message box kis tara se bana sakte hain is ki detail nechay aap dekh sakte hain.



Neechay diye gaye code ko copy ker k is me se "You Pressed Ok" is text ko change ker k apni pasand ka message jo aap start me apne visiter ko dena chahte hain type kerdain.

Monday, April 5, 2010

Technology from arom around the news world



MICROSOFFT
Microsoft ware gaint microsoft reecently up to one million users from its Xbox live syestem in order to weed out useers who have pirated their games. the bans will stop a user from playing any game on theirr Xbox 360 console, so affectid useers will be unable to play online against frienddd aven with a copy purchased legitimately. "All

X-BOX 360

consumerss should know that priacy is illagel and that modifing their Xbox 360console to play pirated disec viiolates theXbox live terms of use , will void their warrenty and result in a ban from Xbox live," microsoft said in the statement. " the health of thee video games business depends on costomers playing for the genuinee product and service they recive from manufacturers, ratailers, and the thid parties that supprot them ." the decision comes as a number of Xbox user have found their consoles unable to connect to Xbox liive after using a pirated version of the newly rreleased game call of Duty: modern warfare 2. it has been one of the most highly anticipated games of all time, with some reportindicating sales of up to seven milliion units in on eday. many Xbox users have complained about their inibality to play the new title after using a pirated copy, saying a large part of thee games requires online connectivity.

DOCTORS COLD SOON DIAGNOSE THE FLU OVER THE PHONE
A new type of softweere beeing developed in Queensland, Australia could lead to doctors dianosingpatient with the flu over the phone. the new technology, which is being develooooooped by both australian and US researchers, would see patiets cough into mobiles phone in order to recive a diagnoses. Udantha Abeyratne from the university of Queensland is working on methodes to fit smarts phone with tiny microphone that would alloww doctors to read the medical datta stored in a recording of a cough . He told that the neww technology was
"unorthodex ..the target is to buuild something that cannnn do screening in the faileed". abbbeyreatne , whhhho has previously worked on technology designed to analyze snoring in order to diagnose sleep apnea, was among a group of 76 researcheees to win a $UUUS 100,000 grant from the bill Gates" research foundatiion >thee technology works by analyzing the data contained in a recording of the last _ milisecond of a cough which regular contains sound that can help medical professionals diagnose illnesses> STAR analytical service < style="font-weight: bold;">massachusettes < style="font-weight: bold;">jaclyn smith saying thee technology is important >"it"s the mssymptom when a patient present< style="font-weight: bold;">ald btechnology from the 19th century." " there is no question that there is a lot of variabillity in the cough of people. but if theey can find certain parametrs to use cough to diagnose disease that could be fabulous. it could really improve diseasee diagnosis and help improve people's access to health care."

AUSTRALIAN DEVELOPER CREATES FIRST IPHONNE VIRUS
a 21-year -old australian student has created the world's first iPhone virus designed to infect phones that have not been protected by passwords. but the creator of the virus , Ashely Towns, has since retreated from the public eye after relasing the APP, blocking his Twitter account in order to prevent users from reading his updates. the virus will only affect phone thhhat are "jailbroken", where users digitally crack open the phone 's file syestem in order to install customized apps and user interface theme not approved by apply. the virus changes a user's wallpaper to a picture of 1980 pop star Rick astley, and display the world "ikee is never gonna give you up" - a referance to astley's hit song and towns'twitter account. but towns insists the virus is not malicious, will not affect a user's phone permaneently and can be easily arased. instead, he told that the virus was designed in order to exploitt "people' s laziness to change their passwordxd". " somebody with moreb malicious intent could have done any thing - read your SMSs, go thourgh your emailes, view your contact, photos - any thing ," he said . the virus comess after a number of seurity expert intheUS have flagged the ability for hackers to obtain personal information from iphones andd Macs, despite thee company 's marketing stratege that brands its prouducts as virus -free while some have doubted towns' ability to create an iphone virus as severalother hav4ee tried unsuccessfully, he maintain he can prove the authenticity of the virus by publishing its source code.

norton internet security

norton internet security

Most of us have a love-hate relationship with our security software. Though we love the protection from online and other threats,
but hate the way the software drags down our daily activities and slows down our computers. Recently, symantec,one of the best hands at antivirus software made an all-out effort to reduce the suite,s impact on performance.And, what do you know-it
worked,Norton internet security 2009 affects performance less than any suite we,ve tested. And there,s more good news: The user interface is streamlined and simplified. most security tasks happenn in the back ground during idle time, eentireely with out user intervention.
even the installlation process is streamlined. the onlly thing you need do is click one big boutton that says you agree to the license-after that the software is fast and a half when i timed it ; activation took another minute ; and the initial livee update of malware difinationns required one more minute. fromm zero to 100 percent ready in under 4 minute? that's amazing!


Performence
surprisingle, when compared to past norton suites this editions is all about performence . the utility is designed from the botton up both to stay out of your way and to demonstrate that it's staying out of your way. the main windows includes a big CPU usage meter thatseparately tracks syestem-wide usage and usage specific to Norton when the syestem seems bogged down, you can see at a glance what's to blame.
Tasks like downloading new virus definitions or scanning for malware can take processing power away from user applications, so the product perform these duties only when the syestem has been idle fora while-10 minutes, by defult. a link above the CPU meter opeans a huge chart of CPU and memory usage over the last 90 minutes. typically you 'll see a spike in norten-specific CPUuse during times marked on the chart as idle the software also supplies a table showing when various background tasks last.
a link below the CPUmeter launches another performence tool, norten insight which speeds malware scanning by indentifying files that don't have to be scanned. it checks all executables on the computer against a data base of trusted programs and displays a big meter showing just how ,any files it has exempted. A full scan is proportionally faster after insight completes its analysis. if you dont't force this full syestem check by activaly lunching the tool, it will completes its analysis during idle time.
Norten's liveupdate runs every 8 hours to get new malware difinitions and any other needed updates. But in the fight against rogue software,8 hours is a long time-a modern threat can spread woorld wide in that times . so norten 's "pulse updates " feature checks for newmalware signatures every few minutes and streams in any that are available.

The Test


We installed norton on a syestem infested with malicious software of many type, among them adware, spyware, rootkits, Trogans, worms, and rogue antispyware. its speedy installatiion was a great boon, as was the fact that it doesn't require a reboot after installation. that post-install reboot is a stumbling block for many suites.. if the programes's real- time protection partially disables a kernal-mode malware sample the syestem may crash on reboot before there's any chance to run a full scan. norton's installation went smothly on all of the infested test syestem, though there were a couple of hiccups during the cleanup process.
scanning a standerd clean test syestem took the suite 50 minutes, quite a bit longer than most. usually 30 minutes is about. usually 30 minutes is about averag. However, that was before norten insight had finished processing. after norten insight indentified 90 percent of the files as trusted, a rescan took just 5 minutes.
Norten quarantines most threats automatically during the scan process. Other threats get removed at the end of the scan, after the user has had a change to close any open programs. in a number of cases, the scan reported that full cleanup would occur after reboot, but as long as the malware was completely deacitivated it did not insist on rebooting immediately. your machine wouldn't find the port close to attack ; he wouldn't find them at all because norten puts them in stealth mode. that's a good thing , but windows firewall can do the same.
The flips side of personal firewall protection is program control-keeping programs on your syestem from abusing access to the internet or network. early personal firewalls asked a million questions. every time a program attempted internet access for the first time, they'd ask the user wheather to permit it or not often in confusing terms. the user just isn't really qualified to make that decision, so norton handles handles program control completely on its own . it destroys known bad programs on sight and grants access to knowns and block them only if their actions appear malicious to be fair, ZoneAlarm (the original too-many-questions fire wall) has all but aliminated those confusing querise in its latest editi.

Network control
Norton's Network security map aerves a number of purpose. it shows all the devices connected to your network and report wheather your wireless network is secure;that is wheather it's encrypted . if other computers on the network are also rurunning norton, you can easily configure remote monitoring just turn on each using the same password, and they'll quickly find each other. by default norten protects your computer from attacks and unexpected traffic even within your own network . theb setting should be finr forcomputer, but it could conceivabely cause trouble for other type of devices. if it does and onely if it does, you can set that devices's trust level to "full trust." you can also lock out specific devices by setting their trust level to restricted, in the rare event that you've allowed an untrustworthey devices into your network

parantal control
many user dont't need perantal - control software, so symantec doesn't include it in the suites 's standerd installation package if you do need this feature, it's easy enough to install-just clicks a link and follow the instructions. the parental control pack is about a 20MDlive update . but do keep in mind that norten's parental-control solutions is limited in scope. it doesn't offer the internet time- control feature found in kaspersky, F-secure, and bitdefender. but atlest it does its on e task well; its categroy-based site blocking is browser-indeprndent, and the kids can't tamper with it.

Privacy control

if you instell the add-on pack you also get norton's old privacy control like many other suites , norton lets you records private information and prevent its transmission and prevent its transmision out of your computer via web forms , outgoing smtp e-mail or specific instant-messaging client . it's nicely implemented with a sport forn each item to define a list of URLexception. the exception feautere lets you define a site's password as private yet allow it at the actual site, so you can use it but not lose it. the saved data is completely exposed to anybody who has the privacy/parent password. that seems like a big mistake . here the approach used by Zone Alarm is great ; it stores private data using one-way encryption . when privacy control dedects that private data is about to be transmitted, norton pops up an alert and asks whether to allow or block the tramnsmision. no password is required, so you can't use privacy control to keep your kids from sending out privaye information. if you do choose to block the data norton replaces it with asterisks.

SEO Starter Guide by Google Webmaster Central Blog

SEO Starter Guide by Google Webmaster Central Blog



Image Credit

As a blogger, we always try to be knowledgeable on Google SEO tips and tricks. Thus, thousands of SEO related blogs have been appeared to fulfill the market needs.

For me, I’ve spent some times on Google’s SEO when I just started this blog. It’s a huge knowledge and SEO is always a mystery for webmasters as Google has never really disclose its search engine algorithm.

Undeniable, SEO is a hot key on Web as everyone is hoping to get better placement on Search Engine Result Page (SERP). Google actually understands that either.

In order to help webmasters to improve website’s performance, Google has released a "Search Engine Optimization Starter Guide" which covers some common areas where webmasters might consider optimizing such as improving title and description meta tags, URL structure, site navigation, content creation, anchor text, and more.

How to Read Allow Your Blog to Only Blog Author

How to Read Allow Your Blog to Only Blog Author

You can read allow your blog to your self and you can restrict your blog to only readers you choose.
These readers will need to log in before reading your blog.

1. First Go to the Blogger.com.

2. Log in and go to the Dashboard.

3. Go to the Settings and click on the Permissions


4. Now you can see there are showing clicks on Anybody means now anybody can read your blog.

5. You will need to change the click on Only Blog Authors then only author can read the blog.

6. when you click on only blog authors then you will allow to author.

How to chenge your blog url


How to chenge your blog url

How to chenge your blog url

this process.


1. Go to the Blogger.com.

2. Sign in and Go to the dashboard.

3. Now go to the settings and Click on the Publishing

7. Enter your new URL in the box and type picture code and in last save settings.

How to make good looking your new post

How to make good looking your new post

How to create a new post

You can make good looking your new post in blogger. Blogger give all setting for making good post, you can see the above picture many setting in this,

1.Open in new tab Blogger .com

2. Sign in and Go to the Dashboard

3. Click on the Edit html and type your post with html code.

How to Add Link Fields

How to Add Link Fields

Add the option to include a related URL and podcasting enclosure links with each of your posts.

1. Go to the Blogger.com.

2. Sign in and go to the Dashboard.

3. Now Go to the Settings.

4. Click on the Formatting.

5. Go down and when you see this option " Show Link fields "
if you see option " No "

6. Then do this option to " YES "

7. Now Save Setting and go to the Posting and see the Enclosure link

In the name of Allah,




In the name of Allah,


1] for the protection of the qureaish-
2]their protection during their trading caravans
in the winter and the summer-
3]So let them serve the lord of this House,
4] Who feeds them against hunger and gives them security against fear.

Prentar


Prentar


This is an easy -to use, cost effective, all in -one imaging device
whit automatic document teeder(ADF) .It is advertised to deliver impressive colour documents at a lower cost-per page than most industry -leding inkjet printers. Boost productivity with the 20-page automatic document feeder, 100- sheet input paper tray and advanced features such as acan direct to PC/network folder/PowerPoint/Word application, and fax- to- computer capability. The performance is quite effective with print and copy speeds at up to 28 pages-per-minute (ppm) black, 22 ppm colour. send and receive faxes quickly at up to 33.6 kbps.Other key features include an integrated phone, a 100- sheet paper tray and more.

Mobile phone Nokia 6700 classic



Mobile phone
Nokia 6700 classic
The Nokia 6700 classic is a series 40 6th Edition phone,
supporting quad-band GSM 850/900/1800/1900 and triple-band WCDMA 900/1900/2100.
Other key features include integrated A-GPS with maps included, a 5.0 megapixel camera with LED flash,Webkit Open Source Browser, Flash lite 3.0, Bluetooth 2.1+ EDR and MIDP java 2.1 with additional java APls.Supported WCDMA frequencies depend on the region where the device is avallable.
Spec cations
General: 2G Network GSM 850/900/1800/1900, 3G NETWORK HSDPA 900/1900/2100

Display : Type TFT, 16M colors

Size : 240+ 320 pixels , 2.2 inches

Data : GPRS Class 32, HSCSD yes, EDGE Class 32, 3G HSDPA, 10 Mbps, HSUPA 2 Mbps, WLAN No , Bluetooth yes, v2.1 infrared port No , USB YES, v2.0 microUSB

Camera : Primary 5 MP, 2592=1944 pixels autofocus, LED flash ,
Messaging : SMS , MMS 1.3 (up to 600KB), e-mail IM Browser WAP 2.0/+HTML, HTML ,

Battery : Standard battery , Li-lon 960 mAh (BL-6Q) , STAND BY up 300 h, Talk time up to 5 h (2G) /4 h (3G) , Music play up to 20 h

Price : 21,890 rupees .