Showing posts with label Internet. Show all posts
Showing posts with label Internet. Show all posts

Thursday 9 August 2012

Best 10 Free Screen Recording Softwares For Creating Screencasts



Mostly tutorials which are some hard to understand or complicated in writing skip by the peoples, because of text tutorials only. But if we create a proper video by capturing our computer/laptop screen and upload the video with the tutorial, then it will become more comfortable to your visitors. We can describe anything which we perform on our computer to anyone by just making a proper video of our actions. 
We use screencasting (screen recording) for making the video of our various tasks performed by us on our computer. By screen recording we can better describe/demonstrate our tutorial which is some how related to computer products or services. And by our screencasted video we can spread our tutorial in easy and fast way.
Today, I am going to share some great collection of screencasting (screen recording) software which are free to use and easy to handle. Here are the 10 best screen recording software.

CamStudio

CamStudio
CamStudio is an open source screen recorder software which can record every screen and audio activity on a computer & create industry-standard AVI video files or bandwidth-friendly Streaming Flash videos (SWF).
Operating system support: Windows

Jing

Jing Screen Recorder
Jing can both take screenshots & capture a screen as videos. It is possible to add textboxes, arrows or rectangles to highlight spots.
It can send the generated outputs to Screencast.com, Flickr, a FTP account, Twitter & more.
With a microphone, you can record audio with the video as well.
Operating system support: Windows, Mac OS X

Webineria

Webineria - Free Screen Capture
This is a very easy-to-use open source software to create screencasts.
It records the screen as an .AVI file & offers an option to create .FLV file from it. With the help of hotkeys, it is possible to start-pause & stop recording.
A great feature is, it can combine another video input (like webcam) with thescreen recording process.
Operating system support: Windows

Wink

Wink
Wink is a tutorial and presentation creation software which can capture screenshots & enables you to add explanation boxes, buttons, titles & more.
It supports various output formats like .EXE, .FLV, .HTML, etc.
Operating system support: Windows, Linux

UltraVNC Screen Recorder

UltraVNC Screen Recorder
UltraVNC Screen Recorder is based-on CamStudio source with updates to improve the performance.
It supports both audio & screen capturing.
Operating system support: Windows

Windows Media Encoder

Windows Media Encoder
Windows Media Encoder is a powerful application for capturing audio and video content with high-quality multichannel sound, high-definition video quality, and support for mixed-mode voice and music content.
Operating system support: Windows

BB FlashBack Express

BB FlashBack Express
BB FlashBack Express is the free version of some other advanced series. It can record from a video source, screen & audio.
It can export to AVI or FLV & has integrated support for direct uploading to the popular video sharing websites.
Operating system support: Windows

CaptureFox (Firefox add-on)

Firefox Screen Capture
CaptureFox is a Firefox add-on which can record screens frame-by-frame to create tutorials. It also supports audio recording.
Operating system support: All major operating systems

uTIPu TipCam

TipCam
TipCam, besides the standard screen recording with audio & video, has various features like:
  • has AVI & FLV support
  • audio can be re-recorderd
  • beginning & end parts can be trimmed
  • video can zoom to the mouse cursor with smart zooming
  • ability to draw free-style during recording
Operating system support: Windows

Krut

Krut Screen Recorder
This is a tiny Java application (works on many platforms) for creating screencasts.
Krut records movie files of selected parts of your screen in the quicktime mov format, including sound. The program has an intuitive and compact user interface.
Operating system support: All major operating systems

Tuesday 31 July 2012

How to increase Processor Speed

                     


There are many steps to increase your processor speed or system performance.
This post is for those people who are having problem with Processor speed. Follow the below steps carefully..
If you are using Microsoft Windows xp,then your processor speed may slow down.Why because Windows Xp carries extraordinary large list of unusual,visual sound effects,menu shadows,high resolution, quality color,fade effects and many.These features may slow down your Processor speed.


By decreasing your Xp resources,your Processor speed may definitely increase.


Firstly disable all the settings in Start up mode.
this can be done by following instructions :

1)Go to “Run”.
2)type “msconfig” in run.
3)Go to Start up.
4)Disable all startup items except Antivirus.

Prefetch files:-


delete all prefetch files.
1)go to run.
2)type prefetch.
3)delete all files.

If you are not having any with work with resolution better you restart your system in Safe Mode.This can be done by continuously by clicking F8 key more than 5times as soon as restart your system. Then a page will open with many options.Choose “Safe Mode“.If you want to do any Networking then choose
“Safe Mode with Networking“.

These two options may remove all your display,resolution,bit size settings etc.
But increase your system speed.

Visual effects:-

1)Right click on “My Computer” >Go to System proporties>Go to Advanced Settings
2)Then click on the Setting in Performance then choose the option”Adjust for best appearance”or you
can choose”custom”.

These options many decrease your system visual effects but increase your system performance.

Automatic updates:-

Even though your system is geniune better to turn off your Automatic updates.There are many reasons
which slow down your processor speed if you turn on Automatic updates.few reasons are:-

1)Most of your RAM speed is used by Xp Operating System.If the resources of your XP is increased then Operating
System may slow down.It indirectly effects the processor speed.
2)If your click on Live Up dates then there may be chances of Virus entering in your system.which leads your
processor speed slow.

Defragmentation:-
This is the major step which increases your Processor speed.
Steps to perform Defragmentation
1)Go to my computer.
2)Right click on C drive. Click on proporties.
3)Choose the option Defragment now.

Removing virus:-
Virus such as Trojan,vorm.exe,sass.exe etc which slow down your processor speed.So download any good antivirus software such as Norton,Spyware terminator,Kaspersky etc.I would perfer Kaspersky it is a best antivirus software.Norton may slow down your system performance.

Few months ago i posted a topic on Internet speed.Several ways to increase Internet speed.
Increase your Bandwidth by 20% Windows uses 20% of your bandwidth! Get it back..

Sunday 15 July 2012

How to know who used your PC/Laptop in your absence

                                    How to know who used your PC/Laptop in your absence


Now easily find out, who used your PC/Laptop in your absence, without using any software.
Just follow these simple steps:

start >> run >>eventvwr.msc

Events are stored in three log files: Application, Security, and System.
These logs can be reviewed and archived.
For our purposes we want the System log. Click on "System" in the left-hand column for a list of events.
Look for a date and time when you weren't home and your computer should have been off.
Double click on the eg: info n it will show u the detail.
You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day.

Monday 25 June 2012

How to increase likes on posts/photos/comments ?

Well you must heard about the auto liker on facebook, its in trend now a days to increase likes on posts, photos, comments, fan page etc.

So I have made up a tool for these :)

Means you can get a lot of likes on your posts easily without any spamming. After my long research on access tokens, and a long reading of open graph facebook.. Now i am able to access in any account through access tokens, and can perform many unauthorised actions except changing the password and info :P
So the conclusion is that, dont use any other auto like sites to increase likes. They can use your access tokens for their promotion.

Facebook auto liker

This is a screen shot of my auto liker..

How to use auto liker:


Step 1: Update a status on facebook, or post on facebook anything. But make sure that you post must be in PUBLIC privacy.

                            

Step 2: Click here to go to our Auto Liker.

Step 3: Click on GET ACCESS TOKENS and follow the steps. When you got your access token it will looks in your url bar like this.

Access token

After allowing the application you will reach to your home page, and your url looks like this:

https://www.facebook.com/#access_token=AAAAACjDjF7IBAHuZB0dfhT6fRYxFYgjSjbwiR2mS8JZCTvJ5fmwiVPRZAhR3oEKt1GWBmHF9IEFFfZArcuT1lu2U0WC7cZBtPEotobTeGxAZDZD&expires_in=0 

The red color code, is your access token. Just copy your whole access token (only red colored code) and paste it in our auto liker.

Step 4: When you put your access token in our auto liker, you will reach to a window looks like this:

Facebook auto liker

Here you have to put your Status ID - Page ID - Post ID - Photo ID -Comment ID. And just click on autolike.

Step 5: Now how to get status id/post id etc.. If you want to know your status or post id then just click on time or date of post like this..


When you click on sunday you will get you post id in your url bar. Your url then looks like this:

---> https://www.facebook.com/lol.lolz.lolx/posts/3093659755322
And the red coloured code is your post/status ID.
Similarly, if you want to know your photo id, then just click on photo adn you get you url bar something like this:

---> https://www.facebook.com/photo.php?fbid=3083754667701&set=a.1319233115765.42123.1678911143&type=1
and the red coloured code will be your photo id.

Now comment id format will be like this post id_comment id.
Means just click on time of comment just like the post id, but this time you need to click on comment time.
Then your url will be something like this:

--> https://www.facebook.com/lol.lolz.lolx/posts/3093659755322?comment_id=3251853&offset=0&total_comments=7

Here the green code is your post id, and red text is your comment id. But when you put the code in our auto liker to increase likes on comment your format should be post id_comment id Means here 3093659755322_3251853 It will be the comment ID.

NOTE: Before submitt any id in our auto liker, be sure that your post or comment post or photo will be publically shared.

Enjoy another vivekcreations.

Friday 4 May 2012

How to use any SIM in any Modem without unlocking it


Step by step instruction: 
1. Insert SIM in Modem
Idea Net Setter
Vodafone Net Setter

2. Modem show invalid SIM, just ignore it and close modem software.
3. Start NOKIA PC suite.
4. Go to Nokia pc suite connect to internet option.
Nokia PC Suit Menu
5. Go to Configure. Select your data card modem,and make all operator apn setting as like when we use Nokia mobile connection.
Eg:- Apn for Airtel – airtelgprs.com
Nokia PC Suit Configure
6. Finish set up.
7. Now connect to internet through PC suite.
Nokia PC Suit Net Connect
8. Finally your net is connected without unlocking the modem.

For any help regarding this post just mention in comments.



Friday 9 March 2012

Best Linux Distributions

What is the best linux distribution for you ?

There are various approaches to answering this question. The broad answer is: "any of them," but that's not very helpful if you're just looking for a place to start.

The problem is, there never can be one best Linux distribution for everyone, because the needs of each user tend to be unique. Telling someone who's looking for a good introductory distribution to try Gentoo, for instance, would be a mistake because for all its positive qualities, Gentoo is decidedly not a beginner's distro.

All too often, Linux aficionados will tend to list the distributions they like as the best, which is fair, but if they are not aware of their audience, they could suggest something that does not meet that person's needs. Finding a good Linux distribution is like finding a good match in an online dating service: good looks aren't the only quality upon which to judge a Linux distro.

To help users discover the Linux distribution that's best for them, this resource will definitively list the best candidates for the various types of Linux users to try. The use-case categories will be:
  • Best Desktop Distribution
  • Best Laptop Distribution
  • Best Enterprise Desktop
  • Best Enterprise Server
  • Best LiveCD
  • Best Security-Enhanced Distribution
  • Best Multimedia Distribution
Best Linux Desktop Distribution

There are a lot of Linux distributions that have the primary focus of becoming the next best desktop replacement for Windows or OS X. Of all the categories in this list, this is the most sought-after, and contentious, group of distros.

While it would be ideal to include many distributions on this list, the reality is that there really needs to be just one "best" Linux distribution. For early 2010, that distro has to be Canonical's Ubuntu.

linux distros- Ubuntu

Ubuntu edges out its closest contenders, Fedora and openSUSE, because its development team is constantly focused on the end-user experience. Canonical and the Ubuntu community have spent a lot of time and resources on bringing ease-of-use tools to this distribution, particularly in the area of installing Ubuntu and installing applications within Ubuntu.

In addition, Ubuntu's level of support for its desktop products is highly superior, which is important in this class of distributions since it is the most likely to contain users new to Linux. Both the official and unofficial Ubuntu documentation is robust and searchable, a big plus.

Best Linux Laptop Distribution

Laptop distributions almost fall into the same category as desktop users, but there are a number of key differences that make the criteria for evaluating a good laptop distribution important. Power management, docking tools, and wireless ease-of-use are critical to users on the go, as is having a distro that meets those needs.

Right now, the best laptop distribution is openSUSE, one of the lead contenders for the desktop honors. On the laptop, openSUSE shines with great connectivity tools, such as an easy-to-use networking toolset that not only handles WiFi connectivity, but also CDMA/cellular modem connections.

best linux distros

openSUSE also deals with docking stations for laptops very well, including dual-monitor management on the fly. Power management is very granular, which is great for detailing various power needs you might find yourself needing.

Best Linux Enterprise Desktop

This category is replete with great contenders as well, and it's difficult to highlight just one. At the end of the day, though, the nod must be given to SUSE Linux Enterprise Desktop (SLED).

linux distros SLED

The reason is simple: while SLED and its primary competitor Red Hat Enterprise Linux Desktop are nearly identical in features and support performance, SLED has the advantage of the openSUSE Build Service, a free and open service that lets applications be built and delivered to SUSE Linux and openSUSE products (as well as Red Hat and CentOS).

This is a very important differentiator in enterprise desktop development, as it means that SLED has the current advantage of application building and deployment in the enterprise arena.

Best Linux Enterprise Server

Again, in this category it really comes down to two main contenders: Red Hat Enterprise Linux (RHEL) and SUSE Linux Enterprise Server (SLES). Given the pick for the Enterprise Desktop category, you might expect SLES to get the "best of" label here.

But, when all factors for the enterprise server are weighed, RHEL is still the king of this particular hill.

Best Distros Red Hat

Red Hat edges out Novell with its server product, because RHEL users get a deeply mature distribution, and Red Hat's support structure is second to none in the enterprise channels.

Best Linux LiveCD

As Linux technology improves, users can easily choose the LiveCD version of practically any of the Linux distros listed here to get the best LiveCD experience for their needs.

There is a specialized class of LiveCDs, however, that offers users utilities and tools for the specific purpose of repairing existing Linux and Windows installations. These distros are very useful to have regardless of what primary Linux distribution you like to use, because in a crisis they are invaluable to own.

In this class of distribution, KNOPPIX is hands-down the most complete and useful distro. Loaded on a CD or USB storage device, KNOPPIX will let you recover from nearly any rare Linux system crash as well as the much-less-rare Windows breakdowns.

Best Distros KNOPPIX

Best Linux Security-Enhanced Distribution

Linux is inherently very secure compared to other operating systems, but there's always room for improvement.

One of the challenges for locking down Linux is if you are not careful, you can take away too much functionality. Another challenge is that the best security-oriented Linux distro, SELinux, is historically known to be difficult to configure correctly. Still, if security out of the box is your priority, this is the best place to begin.

Another approach is the white hat method: using security and forensic tools to examine your existing installation, determine the holes, then lock your system down based on what gaps you find. If you have the time and inclination, this is a great way to do it, because this will get any existing system more secure right away.

For the white hat approach, the best distribution is BackTrack Linux, a dedicated penetration testing distro that will enable you to safely try to crack any system you are caretaking. Its toolset and strong community give it the advantage in this category.

Best Distros Back Track

Best Linux Multimedia Distribution

General Linux distributions have come a long way in terms of multimedia performance. Rare is the audio or video file that can't be played on Linux. Music services such as Rhapsody and video sites like YouTube and Hulu are also standards-compliant and accessible to Linux users.

Still, for those users who are multimedia creators as well as consumers, there are Linux distributions that contain powerful tools for audio and video editing.

The best in this class is currently Ubuntu Studio. For audio, video, and graphic production, it contains a very complete set of tools, as well as format and codec support for a huge range of multimedia formats.

Best Distros Ubuntu Studio

The applications contained in Ubuntu Studio are the same or similar to those used by major studios to create cutting edge work, so users are getting the best apps, coupled with the strong support ethos already found in the Ubuntu community.

In Linux there are as many opinions as there are lines of code. This represents one view of the best in Linux. Select yours.

Sunday 4 March 2012

Don't Get Caught! How to Protect Your Hard Drives from Data Forensics



Over the past few days, a lot of questions have been posed to me about removing sensitive data from hard drives. Ideas seem to range from magnets to microwaves and a lot of things in-between. So, I'd like to explain a little bit about data forensics, how it works, and the steps you can take to be safe.

Often, an anon will delete files from his computer, but that is only half the story, as those files are still really there. And if the careless anon doesn't take steps to fix that, when his door gets kicked in and the FBI takes his hard drive, they will be able to see everything. Don't be that anon.

What Is Computer Forensics? The People on 'CSI'?

Computer forensics is the collection, preservation, analysis and presentation of computer-related evidence. In summary, it helps determine the who, what, where, and when related to a computer-based crime or violation. When the feds are finished arresting you and boxing up your belongings into evidence crates, they will ship them off to the FBI data lab in Washington, D.C.


In addition, an examiner will work to uncover all files on the subject's system. This includes existing active, invisible, deleted, hidden, password-protected, and encrypted files. In many cases, information is gathered during a computer forensics investigation that is not typically available or viewable by the average computer user, such as fragments of data that can be found in the space allocated for existing files (known as “slack space”). Special skills and tools are needed to obtain this type of information or evidence.


An expert can recover pretty much all of your deleted files, along with other data that has not yet been overwritten. As a computer is used, the operating system is constantly writing data to the hard drive. From time to time, the OS will save new data on a hard drive by overwriting data that exists on the drive, but is no longer needed by the operating system, i.e. a deleted file.  So, the ongoing use of a computer system may destroy data that could have been extracted before being overwritten.

How to Protect Yourself

While erasing files simply marks file space as available for reuse, data-wiping overwrites all data space on a storage device, replacing useful data with garbage data. Depending upon the method used, the overwrite data could be zeros (also known as "zero-fill") or could be various random patterns. This is why simply deleting information is never enough. You must take proactive steps to ensure your removal is complete.

We are going to use a great boot disk called DBAN to perform this operation.

Step 1

Obtain and Burn DBAN

You can download the 2.2.6 Beta release from Sourceforge. Once you have the .ISO, all that's left to do is burn it to a blank CD/DVD. Place the media into your drive and restart the computer. Most computers are set to try and boot from the CD drive before the hard disk. If this is not the case, and your computer does not boot the CD drive, you will need to enter your BIOS setup and change the boot priority order.

Step 2

Boot and Run!

After the CD starts, you will be greeted with this screen:


We want to simply press enter here to start DBAN in interactive mode. The main menu shown below should display your hard drive to be wiped.



The next screen shows us DBAN is ready to get down to work, the default method is a DoD Short wipe, and it will work fine for us.




Hit the space bar to select and it will start. Be warned though, the DoD wipe takes a bit of time, especially on larger hard drives. But not as long as a prison sentence would be.

In Closing

DBAM is a great tool to clean a hard drive. I carry a copy of it in my laptop bag when I travel and you should do the same. It is quick and easy and works better then most other tools I have used. Be careful as (obviously) it is impossible to recover if you zap the wrong hard drive!



Saturday 3 March 2012

How to stop email spam on Gmail

One of the most compelling reasons to use Gmail is to avoid excessive amounts of spam email. Gmail uses innovative technology and community reporting to recognize and automatically filter out spam emails. However, even the most advanced spam filters are not 100 percent effective, and some spam will eventually trickle through the system. To minimize your spam exposure, you can report the spam using Gmail's reporting system and alter your email usage to further protect your email address.

how to stop email spam

Here i am giving you some steps on How to stop email spam.

Modifying Your Email Address for Filtering

Step 1
Modify your own Gmail address with periods (".") within your username, such as transforming "myemailaddress@gmail.com" to "my.email.address@gmail.com." Gmail will read it as the same email address.

Step 2
Extend your email's username with pluses ("+"), followed by a keyword, such as changing "myemailaddress@gmail.com" to "myemailaddress+possiblespam@gmail.com." Gmail will still recognize the email address as yours and deliver it to you.

Step 3
Use "googlemail.com" domain instead of "gmail.com," such as changing "myemailaddress@gmail.com" to "myemailaddress@googlemail.com." This is the old Google domain, but still functions as if you used the current domain.

Step 4
Use these modified email addresses when entering your email on websites. This gives you the ability to filter them, should they become targeted by spam.

Filtering Modified Emails

Step 1
Click "Create a filter" at the top of the Gmail window, to the right of the search bar.

Step 2
Enter the modified email address in the "To" field, and click "Next."

Step 3
Select the appropriate action, such as marking the message read, sending it straight into the archive, applying an identifiable label or deleting it. Click "Create Filter" to create the filter.

Step 4
Create additional filters for each modified email address.

Filtering Specific Emails

Step 1
Select the email you want to filter.

Step 2
Click "More actions" and choose "Filter messages like these." The "From" email address is automatically filled.

Step 3
Modify any other filter criteria you desire, such as subject lines or keywords, and click "Next."

Step 4
Select the action, such as deleting it, applying a label or sending it straight into Archives.

Step 5
Click "Create Filter" to apply the new filter.


Tips & Warnings on how to stop email spam

  • Select any spam messages and click "Report spam" on the top menu to move the message to the spam folder. This also marks the sender as a spam sender, which usually stops subsequent messages and helps Gmail identify spam email to help the Gmail community as a whole.
  • Consider creating a completely separate email account for signing up with websites. As an example, some sites may require you to enter you email address to set up an account or grant access. However, you may not want to receive email from this site, so you could give them the "junk" email address. If they start sending spam, it only goes to this junk email address.

Thursday 1 March 2012

How to change IP with Proxy

One way to change the IP address of the computer is by using a Proxy.
Now we need to go in deep of this creation for better understanding.

What is a Proxy?

In general a proxy is an IP (Internet Protocol) or an intermediary who can serve as a media liaison with the ISP connection. Proxy is one of the functions can change our computer identity (IP) with a different IP. Here are tips on replacing the IP with a proxy:

For this creation I use the Mozilla Firefox browser.

Consider the following example, before I change to using the tool what is my ip IP and location of the server looks as follows (IP deliberately Blur because the interests of privacy):

what is my ip

After I enter the proxy would look as follows:

How to change IP with Proxy

All identities will be changed by entering the proxy.
Follow these steps to change the IP
In the Browser tap  Tools> Options , then the box will pop up the following configuration

mozilla option tab

Then select Advanced> Network> Settings , will appear as follows:

mozilla advanced option tab

Fill HTTP Proxy with your Proxy, for example I use data
IP: 89.97.232.161
Port: 80
Country: Italy

Then press the OK to terminate. You can find out your computer with the new IP tool what is my IP . while for some you can use proxy to download Proxy here.
If still you are facing problem regarding my post then you can mention in your comments.
Good Luck :)


Friday 17 February 2012

Facebook Auto Poke Back For Mozilla And Crome

In my previous posts related to Facebook I have posted a lot about facebook tweaking and tools, as you can check Facebook Chat Code Generator Or Fake Facebook Status Machine..

Today i am going to share an interesting post on Facebook in which i will explain about a trick on Facebook Poke Back. Means you can poke back all the peoples who poked you by just a single click. And also you can poke random peoples on facebook. I will share two paths of Facebook Poke Back trick 1st one is through Google Crome and second one is through Mozilla Firefox.
Now lets start with 1st path..

HOW TO AUTO POKE BACK IN GOOGLE CHROME

Step 1:

Open your Google Chrome browser.

Now Click here to go to ‘POKE ALL FOR CHROME’ Extension in Chrome Store and install the Extension by clicking Install button.

Facebook Auto Poke Back For Mozilla And Crome | Vivek Creations




Step 2:

After clicking Install, you can see the Installed conformation message in your browser top right side. Now the Extension is Installed.

Now you have to configure the Extension. You can see the Extension FACEBOOK ICON in the Top right side of the browser, Click on it and Check the option ‘AUTO POKE’. (Screenshot below)

Facebook Auto Poke Back For Mozilla And Crome | Vivek Creations

Step 3:

Thats all, all done.
Now lets check it.
Ask any of your friend to poke you and Refresh the page or nagivate to some other page in facebook to get poke notification. After that you can see the message in the poke notification area that Auto poked with your Friend name who poked you. Example shown below


Facebook Auto Poke Back For Mozilla And Crome | Vivek Creations

If the Extension not working, Clear the Cache and Restart the Browser to try again. Any problem ask help in comments.

I hope you understand our 1st path of Facebook auto poke back trick. Now Lets take a look on How to do the same with Mozilla Firefox.

HOW TO AUTO POKE BACK IN MOZILLA FIREFOX

In Mozilla Firefox you have to install Grease Monkey add-On before we install FACEBOOK AUTO POKE script.
If you already installed Grease Monkey add-on in your Firefox browser, then you can skip this step and go to Script Installation step.

Step 1: Click Here to install Grease Monkey


Step 2: (Installing Facebook Auto Poke Script)
After installing Greasemonkey Addon, you should restart the browser to take effect and now Click here and go to ‘FACEBOOK AUTOPOKE SCRIPT’ page and Click ‘INSTALL’ button which is located in the Top right corner of the website.

Facebook Auto Poke Back For Mozilla And Crome | Vivek Creations

Now the Installer popup will come, Click ‘INSTALL’  in that popup box.

Facebook Auto Poke Back For Mozilla And Crome | Vivek Creations

After clicking ‘INSTALL’. Greasemonkey will show notification in the Bottom side corner that script is installed.

Greasemonkey notification

Now the Script Installed Correctly. Now ask Your friends to Poke you in facebook and you check your poke notification area, you can see its already poked back automatically.

Facebook Auto Poke Back For Mozilla And Crome | Vivek Creations



Thats all :)
Please mentioned your views in comments about my this creations.

Monday 6 February 2012

How to speed up internet without any software | Full Tutorial

How to speed up internet without any software | Full Tutorial

Well in my this creation i will teach you, how to speed up your internet without any software. Its just a game of registry edit.

Yeah you can speed up you net by this tutorial. So lets start how it works and what you need to do :)

For Windows 2k/XP

1. First, open the Windows Registry using Regedit, and (after backing up) navigate to:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\ServiceProvider

2. Note the following lines (all hex dwords):

Class = 008 ( biggrin.gif - indicates that TCP/IP is a name service provider, don't change
LocalPriority = 1f3 (499) - local names cache
HostsPriority = 1f4 (500) - the HOSTS file
DnsPriority = 7d0 (2000) - DNS
NetbtPriority = 7d1 (2001) - NetBT name-resolution, including WINS

3. What we're aiming to do is increase the priority of the last 4 settings, while keeping their order. The valid range is from -32768 to +32767 and lower numbers mean higher priority compared to other services. What we're aiming at is lower numbers without going to extremes, something like what's shown below should work well ;)

4. Change the "Priority" lines to:

LocalPriority = 005 (5) - local names cache
HostsPriority = 006 (6) - the HOSTS file
DnsPriority = 007 (7) - DNS
NetbtPriority = 008 ( biggrin.gif - NetBT name-resolution, including WINS

5. Reboot for changes to take effect.



For Windows 9x/ME

1. The tweak is essentialy the same as in Windows 2000/XP, just the location in the Registry is slightly different. For a more detailed description see the Windows 2000/XP section above

2. Open the Windows Registry using Regedit, and (after backing up) navigate to:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VxD\MSTCP\ServiceProvider

3. You should see the following settings:
Class=hex:08,00,00,00

LocalPriority=hex:f3,01,00,00
HostsPriority=hex:f4,01,00,00
DnsPriority=hex:d0,07,00,00
NetbtPriority=hex:d1,07,00,00

4. The "priority" lines should be changed to:

LocalPriority=hex:05,00,00,00
HostsPriority=hex:06,00,00,00
DnsPriority=hex:07,00,00,00
NetbtPriority=hex:08,00,00,00

5. Reboot for changes to take effect


System.ini IRQ Tweak - Windows 9x/ME ONLY

1. Find your Network Card's IRQ

1. In order to add the entry to your System.ini file, you'd first have to find your NIC's IRQ

2. Right-click on My Computer icon on your Desktop, then left-click on Properties (a shortcut for that would be to press the 'Windows' + 'Pause' keys). Navigate to Device Manager and double-click on Computer. Under "View Resources" you will find a list of IRQs, each with description of the device that's using it. Note the IRQ number used by your Network Adapter

2. Adding the entry to System.ini

1. Once you've found the IRQ of your Network Card, you need to reserve some RAM for its use, by adding an entry to the System.ini file. You can edit the file in any text editor, however the easiest way is to use Windows' built in "System Configuration Editor"

2. Navigate to Start > Run and type sysedit . Find the [386enh] Section in the System.ini file and add Irq[n]=4096 under it, where [n] is the IRQ number of your NIC and 4096 is the amount of RAM you want to reserve in Kbytes. We recommend using 4096, however you can experiment with different values if you want. Save changes in the file, exit and reboot for changes to take effect.

Note: If you choose to try different values, keep in mind that reserving too much RAM for your NIC will decrease the amount of RAM available for applications, while reserving too little might not give the desired effect. It is the one of the great creativity of Vivek Creations Now some additional thoughts.


3. Additional Thoughts


1. The only negative effect of the System.ini IRQ tweak is that it will reduce the amount of RAM available for running applications a bit, by reserving some specifically for your Network Card's use. The gain in performance usually outweighs the negative effect by far, considering any Computer with 32Mb of RAM or more

2. This tweak may or may not work for you. It is not a documented tweak by Windows

3. Keep in mind that if you add hardware to your system the IRQ of the Network Adapter might change, in which case you will need to modify the setting in System.ini

4. In systems with multiple NICs, you might want to add the setting for both IRQs. Also, you could reserve RAM for other IRQs if you wish, just use common sense and don't forget it reduces the amount of RAM available for running applications

5. If you are using an USB device, it does not have a specific IRQ, however you can try adding the entry using the IRQ of the USB Controller

6. For internal Cable Modems, you'd have to add the entry using the IRQ of your modem, rather than the IRQ of a Network Card.


RESULTS WILL VARY


No matter how good your systems may be, they're only as effective as what you put into them. Enjoy my creations and keep yourself updated here for more interesting tutorials.
Do you want more tutorials related to Windows or Registry ?
If you want to read them all then simply Click Here



Sunday 5 February 2012

How to Undo a Sent Email in Gmail


Gmail is one of the biggest email service provider of Google. It gives you a vast memory of storage of above 7.49 GB during the time of writing this post. In mobiles we communicate via SMS for free of cost like wise in internet we send emails to communicate to others for free of cost. Basically every internet user owns his private email id. It’s natural that every human makes a mistake. But sending an email with mistakes might cause a problem anytime.

So, Gmail has a feature of undoing a sent email. By oversight or unintentionally if you send an email you can undo it in Gmail and the email will be saved in drafts and can be corrected and resend it again or you can trash that email. Undo is sudden option which can only be used when you accidentally send an email to others by mistake.


Steps to Undo a Sent Email in Gmail

1. Log in to your Gmail account. Now click on settings icon which you can find in left top bar. If not go to mail settings in old user interface and then you can find settings in that menu.

Undo a Sent Email in Gmail

2. Now in settings menu you can see the ‘Labs’ option click on it. Now you will find a normal search bar where you can type anything you want in that search bar.

Undo a Sent Email in Gmail

3. Now make a simple search for “Undo Send” extension in labs. You will find a cool Gmail Beta Plugin which helps in you in undoing a sent email by mistake in Gmail, now as soon as you Enable it and click on Save your Mail settings. Refresh your page otherwise Gmail will automatically load again so that plugin could start working in your account.

Undo a Sent Email in Gmail

4. Now just refresh the page of Gmail to see that Gmail Beta plugin in action.

5. Now you can try once by sending an email to anyone. Go to compose email or just click on any email and select the reply option in that email. Fill the spaces you want to send email and then click on Send, now you will see email sent and you will find a small Undo Option besides it to get that email back, click that and you email will be backed up in Drafts for future use. You can edit that email and resend it or you can trash that email if you don’t want it for further use.

Undo a Sent Email in Gmail

This feature has been introduced in Gmail since long time but yet many are still unaware of this. Don’t forget to reload the page or refresh your Gmail account once after enabling this. So, now you are not lagging behind with any new Gmail features. Now there is no word of mistake in your Gmail history.