Wednesday, April 30, 2008

Custom User Icons

If you plan on getting a copy of XP, one of the first things you're going to do is set up a user account. Why not give your user account its very own picture? It's OK if you don't want to use a picture of your own because Windows comes with at least 20 beautiful pictures to choose from.

Here's how you can customize your user account icon.

Single-click the start menu and choose Control Panel.
Single-click the User Accounts icon.
Find the user account you'd like to change the icon for and click on it.
Click the text that says "Change My Picture."
You'll have the option to either pick one of the predefined icons or choose your own.
If you like one of the predefined icons, just highlight the one you like and click the button labeled "Change Picture."
If you'd like to use your own picture, just click the magnifying glass or the text labeled "Browse for more pictures."
This will launch a dialog box directing you to navigate to where your new picture is stored. After you find it, just click Open to save your new changes.

Set Processes Priority

Follow this tip to increase the priority of active processes, this will result in prioritisation of processes using the CPU.

1.Go to the second tab called Processes, right click on one of the active processes, you will see the Set Priority option

2.For example, your Run your CDwriter program , set the priority higher, and guess what, no crashed CD’s

Monday, April 28, 2008

Powerfull INDIA

Ajay Kanth Sriharikota, Apr 28 (PTI) Setting a record, India's Polar rocket today successfully placed ten satellites, including the country's remote sensing satellite, into orbit in a single mission. The ten pack launch of the Indian Space Research Organisation (ISRO) saw the 230-tonne Polar Satellite launch Vehicle (PSLV-C9) carry the heaviest luggage--824 kgs--and put into orbit an Indian Mini Satellite and eight foreign nano satellites besides the Cartosat-2A remote sensing satellite.

At the end of the 52-hour countdown, the PSLV-C9, with a lift-off mass of 230 tonne, blasted off from the launch pad at the Satish Dhawan Space Centre and soared into the clear sky in a textbook launch at 9:23 am. Fourteen minutes after lift off, the fourth stage of the ISRO's workhorse launch vehicle, in its 13th flight, injected the ten satellites, into the 635 km polar Sun Synchronous Orbit (SSO).

This is for the first time that ISRO has put ten satellites in orbit in a single launch. This is also PSLV's twelfth successful flight.

A Russian rocket last year delivered 16 satellites in the outer space but the Russian launch vehicle carried a lesser payload of only around 300 kg. Besides the 690 kg Indian remote sensing satellite CARTOSAT-2A and the 83 kg Indian Mini Satellite (IMS-1), the rest eight Nano Satellites were from abroad.

This is the third time, the PSLV has been launched in the core alone version, without the six solid propellant first stage strap-on motors. Terming the launch "satisfactory", ISRO Chairman G Madhavan Nair said "all parameters worked wonderfully well.

Trojan Horses Increase 300%

If your system gets hacked, chances are it will be from a Trojan. A Microsoft Security Intelligence report tabulated a 300 percent increase in the number of Trojan downloaders and droppers the last half of 2007 -- a trend which security experts say will continue to exponentially grow. Consistent with malware trends, the biggest security threats are moving to the Web and consequently experts say that they expect to see the number of Trojans rise exponentially. The reason? Trojans are by far the most "financially interesting" malware, experts say.

"It's the path of least resistance," said Doug Camplejohn, CEO and cofounder of security company Mi5. "For most enterprises, it's where they're least protected."

These Trojans allow attackers to install a small downloader onto unsuspecting users machines, usually without their consent, in order to record passwords, credit card, bank account numbers and other personal identifying information.

The significant increase in Trojans far outweighed the upswing in previous years, becoming increasingly evident that Trojan downloaders are replacing other types of malware, such as infected e-mail files and attachments, security experts said.

"Executables used to be delivered by other mechanisms," said Jimmy Kuo, principal architect for the Microsoft Malware Protection Center. "Now almost all other methods have gone by the wayside to those that simply lure people to [infected] Web sites."

Camplejohn said that the shift to Web-related threats was tied largely to the prolific, and rapidly self-replicating nature of botnets.

"If you think about it, Trojans kind of provide the best bang for the buck for a malware writer," said Camplejohn. "A smart hacker is going to spend their time and efforts to create a Trojan, in the long run, they're going to be rewarded better for that effort.

"Botnets bring money. Therefore Internet criminals write Trojans," he added. "Why do you write Trojan? Because that's where the money is today."

Microsoft's fourth Security Intelligence Report, which examined the security landscape between July and December 2007, provided analysis and perspective on software vulnerabilities, exploits, malicious software and potentially unwanted software -- software that occupies a gray area, such as adware -- observed by Microsoft security professionals over the last several years.
Meanwhile, the report found that the prevalence of rogue security software also continues to increase, which can be delivered via Trojans as well as by other social engineering methods, such as phishing.

Not surprisingly, the report found that newer versions of Microsoft applications were more resistant to vulnerabilities -- a fact which security experts said was due to increased awareness of security threats rather than failing to incorporate security into its products.

"We all make mistakes, and we learn from those mistakes," said Kuo. "Basically it's not that we didn't think of security, we just know more about it now."

Unlike previous versions, numerous current versions of Microsoft products now incorporate automated software updates, and are less prone to infection in general, Kuo said.

Surprisingly, not everything was on the rise. Bucking recent trends, exploits, malware and hacking accounted for only 13 percent of security breach notifications during the second half of 2007 and only 23 percent of all security breach notifications between 2000 and 2007.

Also countering previous security trends was a decline in the disclosure of vulnerabilities rated as high severity -- altogether, only 32.2 percent of known security vulnerabilities in the analyzed products had publicly available exploit code in 2007. In addition, vulnerabilities requiring a low level of complexity to exploit also continued to decrease.

"Vulnerability trends go up and to the right," said Camplejohn. "To have something reverse that trend, we look at with cautious optimism. That was really the surprise there."

Experts attribute this to a variety of factors. For one, companies might not have completely finished assessing all of their known security flaws.

Another explanation for the downward turn could be attributed to the underground market, in which hackers and cyber criminals purchase vulnerabilities in order to hold onto them for future use.

"We don't want to jump to conclusions that the number went down because we make the product safer," said Kuo. "If the numbers continue to go down, that will be proof."

Tuesday, April 22, 2008

Model Hunt 2008

Are you good looking and young? Have a dream to become a model? Then join a unique online beauty contest for anybody. So what you are waiting for, why not apply online at The site is the perfect place from where you can take the first step towards glamor and modeling.

The winners of the online beauty contest will win $10,000 each. There will be one winner in each of these four categories:

1) Girls 14-19

2) Women 19+

3) Boys 14-19

4) Men 19+

Winner will be declared on 31st of December 2008. Wish you Best of Luck.

Visit Now.

Monday, April 21, 2008

Link Express

Join the Worldwide Link Love!Benefits of Worldwide Link Love!
1. Make new friends around the world.
2. Feel the Link Love.
3. Gain new readers and subscribers.
1. Copy from ~start copying here ~ to ~ end copying here ~ and paste it on your blog.
2. At the end of the list, put your name and the country your in, it doesn’t matter what’s your nationality just put the country where you are publishing your blog. Don’t forget to put links at your name.
3. If u have many blogs, you can link all of it, just make sure you post the same on each blog.
4. Tag eight (8) or more of your blog friends.
5. Tip for blogspot users: make sure you copy and paste the code in Compose mode.Wanna join, and you can’t find your name on the list? Just leave a comment here.Worldwide Link Love!
1. Julia (Philippines)
2. Catherine (Malaysia)
3. shimumsy(u.s.a)
4. Mitch (Philippines)
5. Hailey (Philippines)
6. Sexymom (USA)
7. Elizabeth ( USA )
8.Bestfriend's (USA/Philippines)
9. Allen's wifey (USA/Philippines)
10.Allen's Darling (USA/Philippines)
11.Allen's Sweetheart (USA/Philippines)
12. Mobiletechzone (INDIA)

Thursday, April 17, 2008


Quelle est la méthode de Money-Maker? Vous voulez faire de 200 à 500 $ / € par jour. Rechercher des lieux à visiter. Je possède un site Web qui peut vous aider argent gratuity, argent facile sur le net, devenir riche, Visite Ils vous donnent 4 étapes simples pour gagner de l'argent qui est 100% légal et testés. Visitez ce site et gagner de l'argent, être fier de gagner membre de votre famille.

Live TV on Net a new era in live tv, live show, live broadcast, through internet. To broadcast yourself live on the net, all you have to do is to create an account with Blog TV, plug in your webcam and start broadcasting to the world. Here they are to help you to get 15 minutes of fame, where you can show off your talent. Design of this website is very simple & easy to use. Even a newbies can register and broadcast their shows.
So What are you waiting for visit now.

Saturday, April 12, 2008

Machinbidule Rocks

Machinbidule is a site covering whole lot of information on all most all topics. I like the color, design & logo with a punch line "know your world". Color combination of this site is very good as White, Sky blue & Black. This blog started on 5th July 2007 with a post saying his first hi to this huge World Wide Web. I have navigated whole lots of post written by him, this blogger has written all his posts with good English & grammar. It’s very hard to find a blogger with very less English & grammar mistake. This is my first post in "post exchange program". Hope with this Post Exchange we can gain whole lots of back link. Its give you one review for one reviews of yours. More you write more u get.

Machinbidule is an interesting blog where one can find solutions to almost anything. You can get information about Cell phones, Software, Web Designing, Computers & many more.

De-Stress For Better Memory

Today's education system is highly stressful. And under stress, not only dose the brain not function well, but children behave abnormally. They should be made to improve their memory so that they do well. A relaxed brain leads to deeper insight. It is well known that Newton and Archimedes made their famous discoveries while they were relaxing, the former in a garden and the letter, in the bathtub. But in today's world, recreation alone cannot eliminate stress completely. The following yogic techniques improve memory.

Sambhavi mudra: This position leads to the production of alpha brain waves, indicating a relaxed mind. It can be practiced anytime, in any position.
  • Roll the eyes up and cross them, look at the mid point of the two eyebrows.
  • Maintain the position of the eyes for a comfortable duration, Tratake: This is a meditation that de-stresses the mind.
  • Sit down in a cross-legged posture, keeping the back straight.
  • Place a lighted candle in front of you at an arm's distance.
  • Close your eyes and still your body.
  • Concentrate on your natural breath for 2-3 minutes.
  • Open your eyes and look at the brightest spot in the flame.
  • Gaze without blinking for 2-3 minutes (close your eyes before they start to water).
  • You will see the image with close eyes. Concentrate on that image till it fades.
  • Open your eyes. Practice three times. To rest the tired eyes, rub palms till they are warm and place them on your closed eyes for 8-10 seconds. This should not be done for more than a month at a stretch. Some object such as a black dot, a flower or God's image can be used alternately.

Friday, April 4, 2008

Five Critical Errors Patches By Microsoft

Microsoft announced today that it plans to issue eight security patches that fix holes in its Windows operating system and Internet Explorer. The announcement came in advance of its monthly "Patch Tuesday" security release scheduled April 8.

Altogether, Microsoft is repairing five vulnerabilities deemed "critical" and three rated "important" in almost every version of its operating systems, including Windows Vista, Windows XP and Windows 2000, as well as Windows Server 2003 and Windows Server 2008, and Explorer.

The announcement was part of Microsoft's pre-patch notification, which was posted on the company's Web site today. Microsoft releases regularly scheduled patches on the second Tuesday of each month.

The five critical updates fix errors in Microsoft Office, Windows and Internet Explorer. All critical vulnerabilities can be exploited by remote code execution, which could allow an attacker to issue a denial of service attack or install malware to completely take over an affected system.
The three patches deemed important fix errors that enable hackers to "spoof" and gain unauthorized elevated privileges to different versions of Windows, as well as execute malicious code by exploiting an error found in Microsoft Office.

In particular, the upcoming security bundle addressed problems in the newest versions of Microsoft's operating system, including Windows Server 2008, released last month, and Windows Vista SP1, which became available two weeks ago.

Microsoft said in its advance notification bulletin that its Baseline Security Analyzer can detect whether a users' computer system would requre the update. In order to install the patch, users will need to restart their computers.

Security updates are available from the Microsoft Download Center, which can be found most easily after doing a keyword search for "security update," Microsoft said in its advisory.
The company also announced that it plans to host its April Security Bulletin Webcast April 9, at 11 a.m. Pacific Time.

Thursday, April 3, 2008

Overcome Your Debt With Ease

Are you looking to overcome your debt? Do you need to increase your credit card value?

There will be times when you have debt, and it is overflowing, whereby you will have to answer creditors. This is where will help you, leading you to a situation where you need not to worry about debt. Just join

The reason is because there are a many professional in this field which will take care of your issue and help you out to get the best result. Their service provide a major benefit to common people finding themselves climbing out of debt, which can take years and can be indescribable struggle if you try to do it on your own.

Having No Debt today on your side is a safe bet. Not only can you get a free consultation right now, but you can start the right path to correcting all your debt problems in just a few hours’ time. Nothing will be impossible when you are availing their service, and you also have the choice of picking the right program yourself.

So take the right decision today itself. A decision that is crucial to your financial need. They work with non profits and profits alike.

For more visit

Tuesday, April 1, 2008

Personal Money Machine

Do you need some emergency cash? Are you looking for online payday loans? Money will always be a part of our daily life; we can not go out of money problems. It will always be one of our main problems.

Today i would not talk about money problems, but i would like to talk about online payday loans. Personal Cash is one of the companies that provide payday loans. All you need to fill up a free online application and within few hours a representative would call you to confirm your details. And within a day they will credit into your account.

Personal cash advance is the easiest way to get payday loans without bothering of documents. To be eligible, you must be 18 years old, make at least $1000 a month, a U.S. citizen and possess an active savings account. They don’t check your credit background.

But you should keep in mind that availing their services, you are committed and responsible in all the payments that you should pay during the payment days. This will give you a great help in making your subscription a great experience, and this will develop bond with your financial assistance provider the

They will give you all the information that you need about online payday loans. So visit the site and apply for payday loans to solve your financial problems.

Tension Free Mortgage Loans

Thinking of buying a new home for your family? Buying a new house is very exciting thing but can also be stressful and difficult, making a decision on which types of loans to have.

What if your income is not enough to buy a beautiful and comfortable house for your family life?

Now there is a solution to this problem., these people are professionals in this business and working since 1995 and very reliable. They will help you to find out how much of a loan payment can you afford? How much should the loan amount and loan term be? They will provide you detailed information about interest rate, fixed or adjustable.

They will also help you through out the loan process. You can do research, shop, and compare all loans type to find which one the best for you. You can easily manage your money in terms of payments with a clear and flat rate in this program of mortgage loans.

So, try to find your new home there in an instant with the service of You can also find out more about their services they are having in their mortgage loan blog, and also to know about some of the issues in mortgage services that will guide and educate you more when acquiring your mortgage loans.