Friday, August 26, 2011

HOW TO RUN TWO OR MULTIPLE INSTANCES OF GOOGLE TALK ACCOUNTS AT THE SAME TIME?

          
Do you have multiple Google accounts that you use to chat with people? Google Talk is an effective way to chat with other Google and Gmail users from your desktop without using an internet browser. But, by default the program isn’t set up to work with multiple accounts. I’ve found trouble with this because I happen to have a handful of different Google accounts myself, and it is a pain switching back and forth. Though, you actually don’t have to do this. Google Talk has a hidden feature that allows you to login to as many accounts as you want, simultaneously!
1. First you’ll need to locate the Google Talk shortcut that you want to use to open the program. For most people Google Talk likely starts automatically when you launch windows, and so the only shortcut is located in the start menu.
If this is the case for you, Click the start menu, Type google talk into the search box and then Right-Click the program link to Select Properties.
2. In the properties window Select the Shortcut  tab. Here all you need to do is add the following to the end of the Target box: (There is a space after .exe”)
/nomutex
                         

That’s all it takes! Using the shortcut you just setup, you can now open as many separate instances of Google Talk as you want and login to a different account on every single one of them.

Thursday, August 25, 2011

The Future Timeline According To GOOGLE Search Results

Top 10 Places You Don't Want To Visit


These are the ten places you don’t want to visit! Having said that, maybe the curious would get a thrill from visiting some of these strange and dangerous places, but for most of us, reading about it is quite enough. Feel free to mention any other contenders for the list in the comments.

10.Great Pacific Garbage Patch Pacific Ocean

The Great Pacific Garbage Patch, also described as the Pacific Trash Vortex, is a gyre of marine litter in the central North Pacific Ocean located roughly between 135° to 155°W and 35° to 42°N. Most current estimates state that it is larger than the U.S. state of Texas, with some estimates claiming that it is larger than the continental United States, however the exact size is not known for sure. The Patch is characterized by exceptionally high concentrations of pelagic plastics, chemical sludge, and other debris that have been trapped by the currents of the North Pacific Gyre. The patch is not easily visible because it consists of very small pieces, almost invisible to the naked eye, most of its contents are suspended beneath the surface of the ocean. This is not a place the average Joe would want to visit. 

9.Izu Islands Japan

The Izu Islands are a group of volcanic islands stretching south and east from the Izu Peninsula of Honshū, Japan. Administratively, they form two towns and six villages; all part of Tokyo. The largest is Izu Oshima, usually called simply Ōshima. Because of their volcanic nature, the islands are constantly filled with the stench of sulfur (extremely similar to the smell of thousands of farts). Residents were evacuated from the islands in 1953 and 2000 due to volcanic activity and dangerously high levels of gas. The people returned in 2005 but are now required to carry gas masks with them at all times in case gas levels rise unexpectedly.

8.The Door to Hell Turkmenistan

This has featured on listverse before, but it would be remiss of me to exclude it from this list. While drilling in Derweze in Turkmenistan in 1971, geologists accidentally found an underground cavern filled with natural gas. The ground beneath the drilling rig collapsed, leaving a large hole with a diameter of about 50-100 meters. To avoid poisonous gas discharge, scientists decided to set fire to the hole. Geologists had hoped the fire would go out in a few days but it has been burning ever since. Locals have named the cavern The Door to Hell. As you can see from the picture above, it is one hell of an amazing place, but certainly one you wouldn’t want to visit.

7.Alnwick Poison Gardens England

Inspired by the Botanical Gardens in Padua, Italy (the first botanical garden which was created to grow medicinal and poisonous plants in the 1500s), the Alnwick Poison Garden is a garden devoted entirely to plants that can kill. It features many plants grown unwittingly in back gardens, and those that grow in the British countryside, as well as many more unusual varieties. Flame-shaped beds contain belladonna, tobacco and mandrake. The Alnwick Garden has a Home Office license to grow some very special plants; namely, cannabis and coca which are found behind bars in giant cages – for obvious reasons.

6.Asbestos Mine Canada

Asbestos is a set of six naturally occurring silicate minerals highly prized for their resistance to fire and sound absorption abilities. On the downside, exposure to this stuff causes cancer and a variety of other diseases. It is so dangerous that the European Union has banned all mining and use of asbestos in Europe. But, for those curious enough to want to get close to the stuff, all is not lost. In Canada at the Thetford Mines, you can visit an enormous open pit asbestos mine which is still fully operational. The workers in the mines aren’t required to wear any sort of respiratory protection, and in some sections of the nearby town, residential areas are butted right next up against piles of asbestos waste. The mine offers bus tours of the deadly environment during the summer months. Tickets are free (would you expect it to be any other way?). If you decide to visit, don’t forget your full body bio-hazard suit.

5.Ramree Island Burma

Ramree Island in Burma is a huge swamp home to 1000s of salt water enormous salt water crocodiles, the deadliest in the world. It is also home to malaria carrying mosquitos, and venomous scorpions. During the Second World War, the island was the site of a six week battle in the Burma campaign. Here is a description of one of those horrifying nights: “That night [of the 19 February 1945] was the most horrible that any member of the M.L. [motor launch] crews ever experienced. The scattered rifle shots in the pitch black swamp punctured by the screams of wounded men crushed in the jaws of huge reptiles, and the blurred worrying sound of spinning crocodiles made a cacophony of hell that has rarely been duplicated on earth. At dawn the vultures arrived to clean up what the crocodiles had left…Of about 1,000 Japanese soldiers that entered the swamps of Ramree, only about 20 were found alive.

4.Yungas Road Bolivia

The North Yungas Road (Road of Death or Death Road) is a 61 kilometres (38 mi) or 69 kilometres (43 mi) road leading from La Paz to Coroico, 56 kilometres (35 mi) northeast of La Paz in the Yungas region of Bolivia. It is legendary for its extreme danger with estimates stating that 200 to 300 travelers are killed yearly along it. The road includes crosses marking many of the spots where vehicles have fallen. The road was built in the 1930s during the Chaco War by Paraguayan prisoners. It is one of the few routes that connects the Amazon rainforest region of northern Bolivia, or Yungas, to its capital city. Because of the extreme dropoffs of at least 600 metres (2,000 ft), single-lane width – most of the road no wider than 3.2 metres (10 ft) and lack of guard rails, the road is extremely dangerous. Further still, rain, fog and dust can make visibility precarious. In many places the road surface is muddy, and can loosen rocks from the road.

3.Mud Volcanoes of Azerbaijan Azerbaijan

In the Spring of 2001, volcanic activity under the Caspian Sea off the Azeri coast created a whole new island. In October 2001 there was an impressive volcanic eruption in Azerbaijan at Lokbatan, but there were no casualties or evacuation warnings. But Azerbaijan does not have a single active volcano, at least not in the usual sense of the word. What Azerbaijan does have is mud volcanoes – hundreds of them. Mud volcanoes are the little-known relatives of the more common magmatic variety. They do erupt occasionally with spectacular results, but are generally not considered to be dangerous – unless you happen to be there at the wrong time: every twenty years or so, a mud volcano explodes with great force, shooting flames hundreds of meters into the sky, and depositing tonnes of mud on the surrounding area. In one eruption, the flames could easily be seen from 15 kilometers away on the day of the explosion, and were still burning, although at a lower level, three days later.

2.The Zone of Alienation Eastern Europe

The Zone of Alienation is the 30 km/19 mi exclusion zone around the site of the Chernobyl nuclear reactor disaster and is administrated by a special administration under the Ukrainian Ministry of Extraordinary Situations (Emergencies). Thousands of residents refused to be evacuated from the zone or illegally returned there later. Over the decades this primarily elderly population has dwindled, falling below 400 in 2009. Approximately half of these resettlers live in the town of Chernobyl; others are spread in villages across the zone. After recurrent attempts at expulsion, the authorities became reconciled to their presence and even allowed limited supporting services for them. Because of looting, there is a strong police presence – so be warned, if you visit, you may either be shot or get radiation poisoning.

1.Ilha de Queimada Grande Brazil

Off the shore of Brazil, almost due south of the heart of São Paulo, is a Ilha de Queimada Grande (Snake Island). The island is untouched by human developers, and for very good reason. Researchers estimate that on the island live between one and five snakes per square meter. That figure might not be so terrible if the snakes were, say, 2 inches long and nonvenomous. The snakes on Queimada Grande, however, are a unique species of pit viper, the golden lancehead. The lancehead genus of snakes is responsible for 90% of Brazilian snakebite-related fatalities. The golden lanceheads that occupy Snake Island grow to well over half a meter long, and they possess a powerful fast-acting poison that melts the flesh around their bites. This place is so dangerous that a permit is required to visit.
Courtesy:johnhbradley.com

Difference Between Freeware, Shareware, Free Software And Open Source

                                 
Most computer users usually do not know the difference in Freeware,free software ,shareware and open source softwares.There is a lot of difference in all these terms.After studying a lot of websites I found some real good facts that I am sharing with you.
Freeware: Freeware software’s are available to use with no cost. Proprietary software’s can also be freeware software. Freeware software’s are generally used by companies to help developers, students and communities to develop software skills while using this freeware software, but not to loose their business potential software companies don’t give the source code of the software’s. Freeware software is different from shareware software.
Shareware:Shareware software’s are used for marketing purpose. Computer users can download and use a limited version of software or full version of software for a limited period of time. We can say that Shareware software is just like “Try before you buy”.
Free Software: Free software can be used, modified and studied without any restriction. Free software can be copied and distributed with or without any modifications. A software is free when the end user get’s full software with the human readable form of the program called as source code with above permissions. Free Software Foundation maintains the definition of free software.
Open Source: Open source software can be defined as computer software for which the source code of the software is available under a copyright that must meet the open source definition.
There can be different open source copyright laws enforced by different software vendors.
Hope this clears the difference between all of them.
                      

What is The Difference Between GSM And CDMA?



In cellular service there are two main competing network technologies: Global System for Mobile Communications (GSM) and Code Division Multiple Access (CDMA). Cellular carriers including Sprint PCS, Cingular Wireless, Verizon and T-Mobile use one or the other. Understanding the difference between GSM and CDMA will allow you to choose a carrier that uses the preferable network technology for your needs.
The GSM Association is an international organization founded in 1987, dedicated to providing, developing, and overseeing the worldwide wireless standard of GSM. CDMA, a proprietary standard designed by Qualcomm in the United States, has been the dominant network standard for North America and parts of Asia. However, GSM networks continue to make inroads in the United States, as CDMA networks make progress in other parts of the world. There are camps on both sides that firmly believe either GSM or CDMA architecture is superior to the other. That said, to the non-invested consumer who simply wants bottom line information to make a choice, the following considerations may be helpful.
Coverage: The most important factor is getting service in the areas you will be using your phone. Upon viewing competitors’ coverage maps you may discover that only GSM or CDMA carriers offer cellular service in your area. If so, there is no decision to be made, but most people will find that they do have a choice.
Data Transfer Speed: With the advent of cellular phones doing double and triple duty as streaming video devices, podcast receivers and email devices, speed is important to those who use the phone for more than making calls. CDMA has been traditionally faster than GSM, though both technologies continue to rapidly leapfrog along this path. Both boast “3G” standards, or 3rd generation technologies.
EVDO, also known as CDMA2000, is CDMA’s answer to the need for speed with a downstream rate of about 2 megabits per second, though some reports suggest real world speeds are closer to 300-700 kilobits per second (kbps). This is comparable to basic DSL. As of fall 2005, EVDO is in the process of being deployed. It is not available everywhere and requires a phone that is CDMA2000 ready.
GSM’s answer is EDGE (Enhanced Data Rates for GSM Evolution), which boasts data rates of up to 384 kbps with real world speeds reported closer to 70-140 kbps. With added technologies still in the works that include UMTS (Universal Mobile Telephone Standard) and HSDPA (High Speed Downlink Packet Access), speeds reportedly increase to about 275—380 kbps. This technology is also known as W-CDMA, but is incompatible with CDMA networks. An EDGE-ready phone is required.
In the case of EVDO, theoretical high traffic can degrade speed and performance, while the EDGE network is more susceptible to interference. Both require being within close range of a cell to get the best speeds, while performance decreases with distance.
Subscriber Identity Module (SIM) cards: In the United States only GSM phones use SIM cards. The removable SIM card allows phones to be instantly activated, interchanged, swapped out and upgraded, all without carrier intervention. The SIM itself is tied to the network, rather than the actual phone. Phones that are card-enabled can be used with any GSM carrier.
The CDMA equivalent, a R-UIM card, is only available in parts of Asia but remains on the horizon for the U.S. market. CDMA carriers in the U.S. require proprietary handsets that are linked to one carrier only and are not card-enabled. To upgrade a CDMA phone, the carrier must deactivate the old phone then activate the new one. The old phone becomes useless.
Roaming: For the most part, both networks have fairly concentrated coverage in major cities and along major highways. GSM carriers, however, have roaming contracts with other GSM carriers, allowing wider coverage of more rural areas, generally speaking, often without roaming charges to the customer. CDMA networks may not cover rural areas as well as GSM carriers, and though they may contract with GSM cells for roaming in more rural areas, the charge to the customer will generally be significantly higher.
International Roaming: If you need to make calls to other countries, a GSM carrier can offer international roaming, as GSM networks dominate the world market. If you travel to other countries you can even use your GSM cell phone abroad, providing it is a quad-band phone (850/900/1800/1900 MHz). By purchasing a SIM card with minutes and a local number in the country you are visiting, you can make calls against the card to save yourself international roaming charges from your carrier back home. CDMA phones that are not card-enabled do not have this capability, however there are several countries that use CDMA networks. Check with your CDMA provider for your specific requirements.
According CDG.org, CDMA networks support over 270 million subscribers worldwide, while GSM.org tallies up their score at over 1 billion. As CDMA phones become R-UIM enabled and roaming contracts between networks improve, integration of the standards might eventually make differences all but transparent to the consumer.

Internet In 60 Seconds



Let’s say that it takes you exactly one minute to read through this post. In that time, over 6,600 photos will be uploaded to Flickr, about 70 new domains will be registered, over 1,200 new ads will be created on Craigslist, and more. Here’s what happens on the Internet every 60 seconds.
Now keep in mind that the data below and the infographic above come from the Shanghai Web Designers team. I have done my best to confirm that the statistics provided line up with known data, but you should still take everything with a hefty serving of salt.
That disclaimer aside and without further ado, here’s what’s happening each minute:
- Search engine Google serves more that 694,445 queries
- 6,600+ pictures are uploaded to Flickr
- 600 videos are uploaded to YouTube, amounting to 25+ hours of content
- 695,000 status updates, 79,364 wall posts and 510,040 comments are published on  Facebook
- 70 new domains are registered
- 168,000,000+ emails are sent
- 320 new accounts and 98,000 tweets are generated on social networking site Twitter
- iPhone applications are downloaded more than 13,000 times
- 20,000 new posts are published on micro-blogging platform Tumblr
- Popular web browser FireFox is downloaded more than 1,700 times
- Popular blogging platform WordPress is downloaded more than 50 times
- WordPress Plugins are downloaded more than 125 times
- 100 accounts are created on professional networking site LinkedIn
- 40 new questions are asked on YahooAnswers.com
- 100+ questions are asked on Answers.com
- 1 new article is published on Associated Content, the world’s largest source of community-created content
- 1 new definition is added on UrbanDictionary.com
- 1,200+ new ads are created on Craigslist
- 370,000+ minutes of voice calls done by Skype users
- 13,000+ hours of music streaming is done by personalized Internet radio provider Pandora
- 1,600+ reads are made on Scribd, the largest social reading publishing company
Courtesy: Msn.com

How To Revive A Dead Laptop Battery?

                       

Bring a seemingly-dead laptop battery back to life, to a usable condition, although not quite like-new. It could be almost as good as a replacement laptop battery and a lot cheaper than a universal external laptop battery.
Using a freezer – the same place you put your frozen peas and TV dinners – you could restore a dead laptop battery.
Simply follow the instructions below and save yourself some money. It will only cost you the time it takes to complete the list below. So do yourself a favor and do it yourself!
1. Place a dead laptop battery in a completely sealed plastic bag.
2. Place the bag and battery in your freezer for between 11-14 hours.
3. Remove the bag from your freezer and allow the battery return to room temperature after taking it out of the bag (this is very important).
4. If your laptop batteries are still damp dry it using a cloth or towel.
5. Place your once dead laptop batteries back into your laptop.
6. Now completely charge your battery then leave it on to discharge it completely. Repeat this step at least 3-4 times.
7. Your dead battery should be much more usable, if not totally restored.
You can also consider replacing the internal batteries at a fraction of the cost of the alternatives methods. So, do not condemn your laptop battery to the recycle bin just yet. Using this method could see you saving yourself between 30-90% of the cost of your replacement laptop battery.
This cheap alternative method is to substitute the batteries inside the battery pack with a brand new set.
You first need to remove the battery pack from your laptop. You will then need to open the battery pack carefully (a screwdriver should do the job). Inside, you will be confronted with several batteries and a host of wires. A word of warning, if any battery is leaking proceed carefully. If you are not sure then do not continue.Now you will need to make a note of the type of laptop battery you have and exactly – I repeat exactly – how it is connected (wired) to each other. Just to be sure, you could test your old batteries with a millimeter or similar device to see just what state they are in. If you touch these leaking batteries then dispose of them appropriately and then make sure you wash your hands thoroughly and you’re back in business.
After confirming that they are in fact dead laptop batteries you will need to order some replacement batteries. To do this, ensure the replacements have a higher milliamp value than the old ones, just slightly. When you receive your replacement laptop batteries put the new batteries in the correct positions and replace the wiring so you can do the necessary soldering. Make sure to use the appropriate safety equipment and double check all connections are correct.
Once your laptop batteries are in place and everything confirmed, you should test them with your millimeter to ensure they are working as expected.
Reassemble the laptop battery pack and seal it properly. Re-install the laptop battery into your laptop and start enjoying your laptop’s new lease on life.
Courtesy:pcmech.com


What is Comment Spam?

                                 

Comment Spam is a fact of life for blogs and sites with an open door policy for comments and interaction. Comment spam arrives on your website in two main ways. Occasionally by hand posting of time-wasting idiots who post nonsense for fun or try to get links to their site by posting links to their site everywhere, but more often by robots, little Internet programs that crawl around looking for websites with comments and posting links to online gambling and medications for improving your sex life or extending your life.
Here are some examples.
Pitiful Time Wasters
The pitiful time wasters are the people, often kids, who have nothing better to do but search the Internet for random subjects and then post comments like “Your site sucks”, “f**k you”, “This is such a stupid waste of time”, “Why don’t you have pictures of naked women?”, and my personal favorite, “You don’t have what I’m looking for. I hate you.” You cannot easily control these, but for the most part, WordPress and most blogging and CMStools tend to spot these using sophisticated filtering and stop them or hold them for moderation, especially if it the comment spam includes swear words.
Link Needers
The web is built on links. Search engines increase page ranking dependent upon who you link to but mostly who links to you. People try all kinds of tricks to get their website to the top of the search engine rankings, and link needers are coming after you. By posting a link to their site on your site’s comments, they have bypassed the traditional kind request for a link to their site and forced one upon you. Sometimes they are tricky and try to make the comment match the content, but you can usually tell the difference.
Comment Spam Robots
Comment spam robots are the worst of the comment spam criminals. These are software robots that crawl around the Internet looking for open comments. When they find them, they hook in and start leaving comments all over your site about whatever they are dishing out, usually drugs, medicines, male enhancements, vitamins, gambling, and porn. Their comment spam rarely arrives alone but hits multiple posts throughout your site with the same comment, or a slight variation on a theme. WordPress and other blogging and CMSdevelopers work hard to fight comment spam robots off, protecting their users. It gets harder and harder as people keep designing smarter detection avoiding programs, but the developers usually keep a step ahead of these criminal time wasters.
Sneaky Comment Spammers
The sneaky comment spammers are the ones you really have to look for. They require more work to determine if they are legitimate. These are the nice comment spammers. They say things like: 

  • “I really like your site, keep up the good work.”
  • “This is a beautiful site.”
  • “It looks like you worked hard to create this site. Good work.”
  • “I like what you have to say. I’m going to tell my friends.”
  • “This is really good information. I’m going to mark it as a favorite.”
When these first started showing up, I preened. I even pointed them out to my husband with pride. Then I learned that these were NOT legitimate but creepy comment spam robots that were lying and creating links to their sites. Some investigation found that some of these links were indeed hooking up with pharmacy and gambling sites. DAMN! These are the sneaky comment spammers! More and more comment spam prevention tools help to eliminate these, but if you get a lot of “nice comments” within a day or two across many posts – you’ve been hit by a sneaky comment spammer.

Tips To Protect Your Protect Your Files From External Attack


                     

Essential to peace of mind is protecting the PC and your online privacy. When connected to the web, your work and data is open to attacks of various kinds including harmful . A simple game, picture, or program may be the vehicle for malevolence. So, you need to check whether every file that you download, open, or save, is safe or whether there are irregularities of any kind.
Protect your PC by:
  •  Blocking hackers and viruses by  the latest firewall and antivirus software. It is advisable to  a software firewall even if you have a hardware firewall in your system. A software firewall is designed to query whether or not it should permit “X,” access. The user can specify which  can access the port and which cannot. A bi-directional firewall such as ZoneAlarm3 and Personal Firewall 5 will monitor both inbound and outbound traffic preventing Trojans and backdoor programs from functioning.
  •  Block downloads that  unwanted programs by using the options in Internet  to block all software from source X specified by you.
  • Install software programs that will constantly scan your PC for spyware, adware, dialers, and web bug traces which can create a nuisance and cause crashes, slow down systems, or steal financial information. By adding a schedule you can instruct NoAdware to  scan your PC at set times for in-filtrations.
  • Immunize your PC and prevent malicious add ons to your system. 
  • Configure your PC browser to protect you when you are working online. Use a ‘real time shield’ and prevent intrusions. Be sure to click the “protect IE Favorites” box and ensure that no thief can add an URL without your permission to your browser’s favorites list. This will block offensive and dangerous websites from entering your PC environs.
  • Say “no” to any web address or site that instructs you to download specific software to view their pages. Such software can contain a virus, Trojan horse, or auto dialer.
  • Create a regular back up schedule for your work. Once a week is ideal if you are a virtual worker or running a business. This will minimize any damage should problems arise.
  • Be sure to update your software with the latest patches and bug fixes. Then use the updated or enhanced security settings provided by the updates. There are in built ways which you can operate to block damaging viruses, stamp out cookies, and keep unwanted visitors away from your computer system. The method is easy for example if you are using Internet  just go to Tools-Internet Options-Privacy tab. Click the edit button to accept or reject a specific cookie. Go to the advanced settings and check block third party cookies.
  • Scan all downloaded files before use. Never launch executable or scriptable files namely those that have dot.exe; .bat ;.doc; .vbs extensions. Do not access attachments of any kind before they are certified as safe.
  • Remove file sharing and windows printer options these increase vulnerability of the PC.
  • Encrypt your e-mail and embed an identifying key.
  • Better be sure than sorry. Preventing snoops is easier than trying to recover after an attack. Take informed steps to protect yourself and your PC.