For the first time in India Tata Indicom ties up with the world's largest online social networking site Facebook.
This service offers users to update their status, search/add friends, comment on their status, write on wall or post a message to them.
Users can also receive SMS alerts for pokes, friend requests, comments and more.All the Tata Indicom users gets access to this service completely free.
To Enable this service just register your mobile number on this Facebook link
Whenever someone scraps us on Orkut.com, orkut sends an email notification, but the email just contains the link to your scrapbook, and not the actually message so that u actually login to orkut and waste mb and time.
But this approach wastes your time and bandwidth and is a major reason why orkut.com is blocked in most offices, schools and colleges in India ( Infosys for sure)
Now consider a irritating situation where either you have email access but no internet access or orkut is blocked and you get a email saying that XYZ has left u a scrap..
To save you from such a situation we have RE-launched scrap2mail.googlepages.com
the idea is not new but it is automated now for all
Scrap2Mail combines with free orkutfeeds.com RSS feeds (last time it was ngcoders) and RSS to email service sendmerss.com, and EMAILs you prefect scrap email notifications along with the scrap message and person's profile picture and profile link within 2 hours.
It doesn't EVEN need your orkut username and password
And if your scrapbook is private, All you need to do is add OrkutFeeds Bot to your friends list.
So just visit scrap2mail For All Scrap Solutions Of orkut..!!!
This basically means that all boot files are placed next to each other on the disk drive to allow for faster booting. By default this option is enabled but some upgrade users have reported that it isn't on their setup.
1. Start Regedit.
2. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction
3. Select Enable from the list on the right.
4. Right on it and select Modify.
5. Change the value to Y to enable and N to disable.
6. Reboot your computer.
Open My Computer
•Double-click the drive where Windows is installed (usually drive (C:), unless you have more than one drive on your computer).
•If the contents of the drive are hidden, under System Tasks, click Show the contents of this drive.
•Double-click the Documents and Settings folder.
•Double-click your user folder.
•Right-click any folder in your user profile, and then click Properties.
•On the Sharing tab, select the Make this folder private so that only I have access to it check box.
If you still have any problem then please write it down...
We all know that Hibernate Avoid Losing our Work.
Hibernate saves an image of your desktop with all open files and documents, and then it powers down your computer. When you turn on power, your files and documents are open on your desktop exactly as you left them.
How to put your Tablet PC into hibernation when your battery power reaches a critically low level
1.On the taskbar, tap the Start button, and then tap Control Panel.
2.Tap Performance and Maintenance, and then tap Power Options.
3.Tap the Hibernate tab, select the Enable hibernation check box, and tap Apply.
You might be flabbergasted on hearing this, but yes this is true. It’s been officially revealed by Canadian researchers. The internet based research group started investigating after the Tibetan Exiles made allegations of cyber spying. The investigation revealed that the activities are operated from China.
The Information Warfare Monitor, the research group focused on the allegations made by the Tibetan exiles which ultimately uncovered the Wide network of China’s espionage activities.
The researchers were found saying “The investigation ultimately uncovered a network of over 1,295 infected host in 103 countries. Up to 30 per of the infected host are considered high value targets and includes computers located at ministries of foreign affairs, embassies, international organization, news media and NGO’s .”
On contacting the Chinese officials they remained in the state of denial mode of any involvement in this
The Ghost-network installs a malicious file on the computer which ultimately loses its control over to the Chinese hackers. A report published by the investing group showed an email sent by the unknown attacker to email@example.com( email id of a organization of free-Tibet activity’s) with an word file attached, which on downloading installs the malicious software in the computer through which they can collect the information stored in the computer. In the same manner they have penetrated in most of computers world wide.
The organization’s computer, said, a student for a free Tibet activist Bhutila Karpoche , have been hacked into numerous times over the past four or five years and added that she often gets an e-mail containing viruses that ultimately losses the control over to hackers.
The investigators were deeply concerned on the fact that to cease this network is very difficult as defence against social malware in government agencies involves expensive and intrusive measure that range from mandatory access controls to tedious operational security procedures.
In response to this The Indian Gov has acted swiftly by putting together a full-fledged Crisis Management Plan for countering such cyber attacks. The Ministry of Communication & Information Technology has identified various critical sectors that could be vulnerable to cyber attacks and issued security guidelines to all ministers and government departments asking them to set-up 24/7 cyber control rooms.
The similar news to take steps for the protection against such espionage activities are also coming from various countries.