gєт σякυт ѕ¢яαρѕ ση мσвιℓє ƒσя ƒяєє υѕιηg gσσgℓє ѕмѕ ¢нαηηєℓ !

Orkut Team officially introduced a feature by using you can get the Orkut scraps on your mobile. But by using this official orkut sms feature they cost some charges as per network. But by using this trick you can enjoy free Scrap alerts on your mobile absolutely free. This service works with the help of Google SMS channels and Orkutfeeds.
You have to just follow the simple steps >>

Step 1 >> First of all you have to get the feed url of your Orkut profile by using orkutfeeds.com.
For this, just open your Orkut profile and copy the home page link (In my case it ishttp://www.orkut.co.in/Main#Profile.aspx?rl=fpp&uid=11679667323947250906). ( To copy the page link just right click on your orkut profile properties and copy link from there.)

Step 2 >> Now go to orkutfeeds.com and paste your Orkut profile link (already generated on step 1).After this, just hit the subscribe button and you’ll be provided with your Orkut profile feed URL.

Orkutfeeds


Step 3 >> Also add “#both” at the end of the above URL so that you can get messages of the scrap as well.
Now my feed URL becomes http://www.orkutfeeds.com/feed.php?uid=18178041893973983718#both

Step 4 >> Now go to Google SMS channels homepage and create a new channel as shown in thescreen shot below. If you don’t have an account on SMS channels then create one by logging in with your Gmail password.

Create channel


Step 5 >> Fill all the required details and feed URL of your Orkut page (refer step 2) on the ‘RSS/Atom feed’ form and finally hit the ‘create channel’ button


That’s it! Now you’ll be getting scrap notifications via SMS for free

Note:

  • For this trick to work on locked scrapbooks, you must add this Orkutfeeds bot as your friend.
  • Scrap notification are delayed for 2-4 hours depending on the Google’s server traffic.
Credits & Screenshots : Deepak
THANKS TO : http://orkutting-tricks.blogspot.com

нιѕтσяу σƒ σякυт

A guy lost his girlfriend in a train accident... but the gal's name nowhere appeared in the dead list. This guy grew up and became IT technical architect in his late 20's, achievement in itself!!

He hired developers from the whole globe and plan to make a software where he could search for his gf through the web...

Things went as planned... and he found her, after losing millions of dollars and 3 long years!!

It was time to shut down the search operation, when the CEO of Google had a
word with this guy n took over this application. This Software made a whopping 1 billion dollars profit in its first year, which we today know as ORKUT.

The guy's name is Orkut Büyükkökten Yes it's named after him only. Today he is paid a hefty sum by Google for the things we do like scrapping. He is expected to b the richest person by 2009. Orkut Büyükkökten today has 13 assistants to monitor his scrapbook & 8 to monitor his friends-list. He gets around 20,000 friend-requests a day & about 85,000 scraps!!!

Some other Cool Facts about this guy:

  • He gets $12 from Google when every person registers to this website.
  • He also gets $10 when you add somebody as a friend.
  • He gets $8 when your friend's friend adds you as a friend & gets $6 if anybody adds you as friend in the resulting chain.
  • He gets $5 when you scrap somebody & $4 when somebody scraps you.
  • He also gets $200 for each photograph you upload on Orkut.
  • He gets $2.5 when you add your friend in the crush-list or in the hot-list.
  • He gets $2 when you become somebody's fan.
  • He gets $1.5 when somebody else becomes your fan.
  • He even gets $1 every time you logout of Orkut.
  • He gets $0.5 every time you just change your profile-photograph.
  • He also gets $0.5 every time you read your friend's scrap-book & $0.5 every time you view your friend's friend-list.

нσω ∂σєѕ αηтι-νιяυѕ ѕσƒтωαяє ωσяк?


An anti-virus software program is a computer program that can be used to scan files to identify and eliminate VIRUS and other malware.

Anti-virus software typically uses two different techniques to accomplish this:

  • Examining files to look for known viruses by means of a virus dictionary
  • Identifying suspicious behavior from any computer program which might indicate infection

Most commercial anti-virus software uses both of these approaches, with an emphasis on the virus dictionary approach.

Virus dictionary approach
In the virus dictionary approach, when the anti-virus software examines a file, it refers to a dictionary of known viruses that have been identified by the author of the anti-virus software. If a piece of code in the file matches any virus identified in the dictionary, then the anti-virus software can then either delete the file, quarantine it so that the file is inaccessible to other programs and its virus is unable to spread, or attempt to repair the file by removing the virus itself from the file.

To be successful in the medium and long term, the virus dictionary approach requires periodic online downloads of updated virus dictionary entries. As new viruses are identified "in the wild", civically minded and technically inclined users can send their infected files to the authors of anti-virus software, who then include information about the new viruses in their dictionaries.

Dictionary-based anti-virus software typically examines files when the computer's operating system creates, opens, and closes them; and when the files are e-mailed. In this way, a known virus can be detected immediately upon receipt. The software can also typically be scheduled to examine all files on the user's hard disk on a regular basis.

Although the dictionary approach is considered effective, virus authors have tried to stay a step ahead of such software by writing "polymorphic viruses", which encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match the virus's signature in the dictionary.

Suspicious behavior approach
The suspicious behavior approach, by contrast, doesn't attempt to identify known viruses, but instead monitors the behavior of all programs. If one program tries to write data to an executable program, for example, this is flagged as suspicious behavior and the user is alerted to this, and asked what to do.

Unlike the dictionary approach, the suspicious behavior approach therefore provides protection against brand-new viruses that do not yet exist in any virus dictionaries. However, it also sounds a large number of false positives, and users probably become desensitized to all the warnings. If the user clicks "Accept" on every such warning, then the anti-virus software is obviously useless to that user. This problem has especially been made worse over the past 7 years, since many more nonmalicious program designs chose to modify other .exes without regards to this false positive issue. Thus, most modern anti virus software uses this technique less and less.

Other ways to detect viruses
Some antivirus-software will try to emulate the beginning of the code of each new executable that is being executed before transferring control to the executable. If the program seems to be using self-modifying code or otherwise appears as a virus (it immeadeatly tries to find other executables), one could assume that the executable has been infected with a virus. However, this method results in a lot of false positives.

Yet another detection method is using a sandbox. A sandbox emulates the operating system and runs the executable in this simulation. After the program has terminated, the sandbox is analysed for changes which might indicate a virus. Because of performance issues this type of detection is normally only performed during on-demand scans.

Issues of concern

Macro viruses, arguably the most destructive and widespread computer viruses, could be prevented far more inexpensively and effectively, and without the need of all users to buy anti-virus software, if Microsoft would fix security flaws in Microsoft Outlook and Microsoft Office related to the execution of downloaded code and to the ability of document macros to spread and wreak havoc.

User education is as important as anti-virus software; simply training users in safe computing practices, such as not downloading and executing unknown programs from the Internet, would slow the spread of viruses, without the need of anti-virus software.

Computer users should not always run with administrator access to their own machine. If they would simply run in user mode then some types of viruses would not be able to spread.

The dictionary approach to detecting viruses is often insufficient due to the continual creation of new viruses, yet the suspicious behavior approach is ineffective due to the false positive problem; hence, the current understanding of anti-virus software will never conquer computer viruses.

There are various methods of encrypting and packing malicious software which will make even well-known viruses undetectable to anti-virus software. Detecting these "camouflaged" viruses requires a powerful unpacking engine, which can decrypt the files before examining them. Unfortunately, many popular anti-virus programs do not have this and thus are often unable to detect encrypted viruses.

Companies that sell anti-virus software seem to have a financial incentive for viruses to be written and to spread, and for the public to panic over the threat.

SOURCE->http://www.antivirusworld.com

THANKS TO ANTIVIRUSWORLD FOR THIS ARTICLE .


нσω тσ вℓσ¢к α ωєвѕιтє

There are many reason why you need to know how to block a website. Some of the most common reasons are you have been targeted by spammers who use adware and popups to attack your PC. Other reasons may be to prevent your children from having access to certain site content such as porn and gambling.


How to block a Website using Internet Explorer

Internet Explorer version 5 and later offer the ability for heighten security and privacy. You can block a site by following the directions below:

1. Load your Internet explorer
2. Click Tools
3. Click Internet Options
4. Click the Privacy tab
5. Under the Privacy window, Click Sites
6. Type in the site address that you want to Block and Click OK. Remember this technique only blocks on one site at a time. Parental control software will allow you to block multiple sites and categories.

Block a website step 1

block a website step 2



Here are alternate instructions to block a website using Internet Explorer.
Tools ->Internet Options->Security->Restricted sites->Sites->Type in the site address and Click ADD then click OK

How to Block A Website in All Web Browsers

In Windows XP

1. GO TO RUN COMMAND



2. Type: notepad C:/Windows/System32/drivers/etc/hosts
3. Locate the line 127.0.0.1 localhost
4. To block the website google.com for example, just add this text under 127.0.0.1 localhost:

127.0.0.1 google.com
127.0.0.1 www.google.com

You can add as many sites any site, However you will need to prefix it with "127.0.0.1".

5. Save the file
Google will now be blocked in all web browser. This is an advanced but easy method on how to blow a website.

block a website step 4





5 ѕιмρℓє ωαуѕ тσ ιη¢яєαѕє уσυя ιηтєℓℓιgєη¢є


Your brain needs exercise just like a muscle. If you use it often and in the right ways, you will become a more skilled thinker and increase your ability to focus. But if you never use your brain, or abuse it with harmful chemicals, your ability to think and learn will deteriorate.

Here are 5 simple ways anyone can squeeze a bit more productivity out of the old gray matter.





1. Minimize Television Watching - This is a hard sell. People love vegetating in front of the television, myself included more often than I’d like. The problem is watching television doesn’t use your mental capacity OR allow it to recharge. It’s like having the energy sapped out of a muscle without the health benefits of exercise.

Don’t you feel drained after a couple hours of TV? Your eyes are sore and tired from being focused on the light box for so long. You don’t even have the energy to read a book.

When you feel like relaxing, try reading a book instead. If you’re too tired, listen to some music. When you’re with your friends or family, leave the tube off and have a conversation. All of these things use your mind more than television and allow you to relax
2. Exercise - I used to think that I’d learn more by not exercising and using the time to read a book instead. But I realized that time spent exercising always leads to greater learning because it improves productivity during the time afterwards. Using your body clears your head and creates a wave of energy. Afterwards, you feel invigorated and can concentrate more easily.

3. Read Challenging Books - Many people like to read popular suspense fiction, but generally these books aren’t mentally stimulating. If you want to improve your thinking and writing ability you should read books that make you focus. Reading a classic novel can change your view of the world and will make you think in more precise, elegant English. Don’t be afraid to look up a word if you don’t know it, and don’t be afraid of dense passages. Take your time, re-read when necessary, and you’ll soon grow accustomed to the author’s style.

Once you get used to reading challenging books, I think you’ll find that you aren’t tempted to go back to page-turners. The challenge of learning new ideas is far more exciting than any tacky suspense-thriller.


4. Early to Bed, Early to Rise - Nothing makes it harder to concentrate than sleep deprivation. You’ll be most rejuvenated if you go to bed early and don’t sleep more than 8 hours. If you stay up late and compensate by sleeping late, you’ll wake up lethargic and have trouble focusing. In my experience the early morning hours are the most tranquil and productive. Waking up early gives you more productive hours and maximizes your mental acuity all day.

If you have the opportunity, take 10-20 minute naps when you are hit with a wave of drowsiness. Anything longer will make you lethargic, but a short nap will refresh you.


5. Take Time to Reflect - Often our lives get so hectic that we become overwhelmed without even realizing it. It becomes difficult to concentrate because nagging thoughts keep interrupting. Spending some time alone in reflection gives you a chance organize your thoughts and prioritize your responsibilities. Afterwards, you’ll have a better understanding of what’s important and what isn’t. The unimportant stuff won’t bother you anymore and your mind will feel less encumbered.

I’m not saying you need to sit on the floor cross-legged and chant ‘ommm’. Anything that allows a bit of prolonged solitude will do. One of my personal favorites is taking a solitary walk. Someone famous said, “All the best ideas occur while walking.” I think he was on to something. Experiment to find the activity that works best for you.

source->www.pickthebrain.com

ωнαт ιѕ ѕραм?


Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.

There are two main types of spam, and they have different effects on Internet users. Cancellable Usenet spam is a single message sent to 20 or more Usenet newsgroups. (Through long experience, Usenet users have found that any message posted to so many newsgroups is often not relevant to most or all of them.) Usenet spam is aimed at "lurkers", people who read newsgroups but rarely or never post and give their address away. Usenet spam robs users of the utility of the newsgroups by overwhelming them with a barrage of advertising or other irrelevant posts. Furthermore, Usenet spam subverts the ability of system administrators and owners to manage the topics they accept on their systems.

Email spam targets individual users with direct mail messages. Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses. Email spams typically cost users money out-of-pocket to receive. Many people - anyone with measured phone service - read or receive their mail while the meter is running, so to speak. Spam costs them additional money. On top of that, it costs money for ISPs and online services to transmit spam, and these costs are transmitted directly to subscribers.

One particularly nasty variant of email spam is sending spam to mailing lists (public or private email discussion forums.) Because many mailing lists limit activity to their subscribers, spammers will use automated tools to subscribe to as many mailing lists as possible, so that they can grab the lists of addresses, or use the mailing list as a direct target for their attacks.

нσω тσ ¢αρтυяє ѕ¢яєєη



This is a simple trick to capture your screen shot.

This page shows you how to capture a screen shot of your desktop or a window. Although the print screen feature has been available on Windows machine for a long time, some people have never tried to use it and would want to find out how.







To capture a screen shot of your entire desktop:





  1. Hit "Print Screen" key on your keyboard (or "Print Scrn", or similar).
  2. Open an image editor (i.e. Photoshop, Paintshop, or the Windows built-in "Paint").
  3. Press Ctrl-V to paste the image and save the file as Jpeg, Bitmap, etc..

To capture a screen shot of only a window, a popup, or an error dialog:

  1. Make sure the window or popup which you want to capture is active (on the very front of your screen).
  2. Hold the "Alt" button and press "Print Screen" key on your keyboard (or "Print Scrn", or similar).
  3. Open an image editor and press Ctrl-V to paste the image and save the file as Jpeg, Bitmap, etc..