How to rename the Recycle Bin?

To change the name of the Recycle Bin desktop icon, open Regedit and go to:

HKEY_CLASSES_ROOT/CLSID/{645FF040-5081-101B-9F08-00AA002F954E}

and change the name “Recycle Bin” to whatever you want (don’t type any quotes)

Categories: Tips n Tricks | Leave a comment

Symantec makes push to secure mobile devices

As people increasingly use their smartphones both for work and for pleasure, Symantec is now offering a range of tools designed to better protect mobile devices, no matter where or how they’re used.

The security company today unveiled several updates to its mobile strategy to help companies, consumers, and carriers all better secure and manage smartphones, tablets, and other portable gadgets.

On the business front, companies face strong challenges in securing the mobile phones on their networks, especially as more employees try to use their own personal gadgets on the job. Many can’t support the increasing array of devices on their networks, putting corporate data at risk. Toward that end, Symantec is offering four different product lineups for its corporate customers:

* Device management: Symantec’s Mobile Management product is intended to help IT better keep track of the mobile devices on its network.
* Device security: Symantec Endpoint Protection Mobile Edition and Symantec Network Access Control Mobile Edition are meant to provide a security layer to protect mobile devices.
* Device encryption: PGP Mobile and PGP Support Package for BlackBerry will encrypt corporate data.
* Strong authentication: VeriSign Identity Protection (VIP) Access for Mobile and VeriSign Device Certificate Services will secure passwords and other private information used in business transactions.

Symantec has also unveiled new security features for Android and Apple mobile devices, joining those offered to Windows Mobile, Symbian, and BlackBerry customers. Corporate IT will now be able to inventory the many mobile devices floating about their companies, enforce password protection for those devices, and remotely wipe data from mobile phones if they’re lost, Symantec said.

“By providing mobile security and management for smart devices, we’re making it easier for enterprises to allow their employees to use their device of choice without putting corporate data at risk,” Francis deSouza, senior vice president of Enterprise Security Group for Symantec, said in a statement.

For the individual consumer, Symantec recently launched its Norton Everywhere product lineup, designed to help people protect their personal information if their devices are lost, stolen, or hit by a security threat. Existing Norton Anywhere products include Norton Mobile Security for Android and Norton DNS, which checks every IP address launched to make sure it’s safe.

Finally, Symantec says it will soon offer telecom carriers tools to help them better secure their networks and manage policy enforcement and user preferences. The goal is to reduce costs and limit the number of unhappy customers switching carriers due to spam, malware, and network issues.

Symantec’s new corporate enterprise and consumer mobile tools are out now, while the services for telecom carriers will be available this coming winter.

Read more: http://news.cnet.com/security/?tag=hdr;snav#ixzz11YvCopoh

Categories: News | Tags: | Leave a comment

Facebook announces 5-to-1 stock split

Facebook formally sliced up its stock in a 5-for-1 division on Friday, a move designed to keep the price of individual shares lower as demand for the privately owned Facebook on secondary markets has been driving it upward.

“The reason is that the stock has risen significantly since our last split, and this allows us to bring it into a similar price range as other private companies,” Facebook spokesman Jonny Thaw told CNET. “It also allows us to give everyone larger stock unit grants without increasing dilution for shareholders.”

It’s the third time in Facebook’s six-year history that the company has undergone a split of its shares, following a 4-for-1 division in July 2006 and another in October 2007. Splitting stock is not an uncommon practice, considering that when individual share prices grow very high it can limit their growth. A lower share price can make the stock more accessible to small-time investors.

The sale of Facebook stock on the secondary market has been of great interest to Valley gossips hoping to get a read on what exactly the company’s valuation may be, and when it may finally take the plunge and file for an IPO. Rumors that Facebook employees would be permitted to cash out some of their stock options began to surface about two years ago, and the company formally launched an employee stock buyback program with a major investor, Digital Sky Technologies (which has since changed its name to Mail.ru Group) last year.

The company modified its stock structure to a more powerful dual-class system last year, in a move that some pegged as a preparation for going public soon. A report this summer said that there likely would not be an IPO until next year, and another report from Reuters on Friday tacked on yet another year–suggesting that Facebook would not go public before late 2012.

Categories: News | Leave a comment

Yahoo Mail Minty: New interface, social features, improved speed

http://www.pcworld.in/news/yahoo-mail-minty-new-interface-social-features-improved-speed-35332010

http://news.cnet.com/8301-1023_3-20016158-93.html

Categories: News | Leave a comment

Quote of the day

Relationships of all kinds are like holding sand in your hand
Hold it loosely with an open hand, the sand remains where it is
The tighter you grasp it, the faster it trickles through your fingers

Hold your relationship loosely
with respect and freedom for the other person
it is likely to remain intact
But hold it too tightly, too possessively
then it will likely slip away.

Categories: Miscellaneous | Leave a comment

Apple Unveils 6th Generation Ipod Nano

At a media event on September 1, 2010, Apple announced the sixth generation iPod Nano, which among many new features, will be designed around a high resolution “square shaped” touch-screen.

Some notable changes are as follows: the device now features a smaller 1.54 inch lower resolution (higher pixel density) screen which supports multi-touch, as opposed to the 2.2 inch screen on the iPod nano 5g. The device supports over 24 hours of music playback on a single charge. The device retains the same 30-pin dock connector as previous generations. The new iPod Nano does not support video playback. Additionally, the device no longer has a camera or voice recorder, as Apple’s market research determined that many customers rarely used those features in the previous generation devices. The iPod Nano lost its built in speaker. The 6th generation iPod is at the same price point as the 5th generation device. It still includes Nike fitness option and the FM Radio Tuner. It has the black on white screen contrast option.


Technical Specifications

Size and weight

*Height: 1.48 inches (37.5 mm)

*Width: 1.61 inches (40.9 mm)

*Depth: 0.35 inch (8.78 mm)
including clip

*Weight: 0.74 ounce (21.1 grams)

*Volume: 0.614 cu inch (10,056 cu mm)
including clip

Display

* 1.54-inch (diagonal) color TFT display
* 240-by-240-pixel resolution
* 220 pixels per inch

Capacity

* 8GB or 16GB flash drive2

Sensor

* Accelerometer

Environmental requirements

* Operating temperature: 32° to 95° F (0° to 35° C)

* Nonoperating temperature: -4° to 113° F (-20° to 45° C)

* Relative humidity: 5% to 95% noncondensing

* Maximum operating altitude: 10,000 feet (3000 m)

Audio playback

* Frequency response: 20Hz to 20,000Hz

* Audio formats supported: AAC (8 to 320 Kbps), Protected AAC (from iTunes Store), HE-AAC, MP3 (8 to 320 Kbps), MP3 VBR, Audible
(formats 2, 3, 4, Audible Enhanced Audio, AAX, and AAX+), Apple Lossless, AIFF, and WAV

* User-configurable maximum volume limit

FM radio

* Regional settings for Americas, Asia, Australia, Europe, and Japan
* Live Pause feature for pausing a radio broadcast and rewinding (within a 15-minute buffer)

Headphones

* Earphones
* Frequency response: 20Hz to 20,000Hz
* Impedance: 32 ohms

Battery and power

* Built-in rechargeable lithium-ion battery
* Up to 24 hours of music playback when fully charged
* Charging via USB to computer system or power adapter (sold separately)

    * Fast-charge time: about 1.5 hours (charges up to 80% of battery capacity)
    * Full-charge time: about 3 hours
Categories: News, Technology | Leave a comment

NVIDIA GTX 470M highlights rollout of 400M mobile GPU series

Not everybody needs the world’s fastest mobile GPU, so NVIDIA is sagely trickling down its Fermi magic to more affordable price points today. The 400M family is being fleshed out with five new midrange parts — GT 445M, GT 435M, GT 425M, GT 420M and GT 415M, to give them their gorgeous names — and a pair of heavy hitters known as the GTX 470M and GTX 460M. Features shared across the new range include a 40nm fab process, DirectX 11, CUDA general-purpose computing skills, PhysX, and Optimus graphics switching. 3D Vision and 3DTV Play support will be available on all but the lowest two variants. NVIDIA claims that, on average, the 400M graphics cards are 40 percent faster than their 300M series counterparts, and since those were rebadges of the 200M series, we’re most definitely willing to believe that assertion. Skip past the break for all the vital statistics, and look out for almost all (HP is a notable absentee, while Apple is a predictable one) the big-time laptop vendors to have gear bearing the 4xxM insignia soon.

Categories: Technology | Leave a comment

Break or Recover Router Password

  • Turn the power switch off and back on to recycle the power.

    Press the Break key or key sequence to put the router into ROM Monitor mode. The break key varies by computer or terminal software. The sequence might be CTRL-D, CTRL-Break or another combination.

    At the > prompt, type 0 to record the current value of the configuration register normally 0x2102, or 0x102.

      >o

      Configuration register = 0x2102 at last boot

      Bit# Configuration register option settings:

      15 Diagnostic mode disabled.

    Type o/r 0x2142 to tell the router to boot from flash without loading the configuration in NVRAM at the next reload.

    Type i to have the router reboot. The router ignores the configuration in NVRAM.

    The router runs the setup dialog, Type no or press Ctrl-C to skip the initial setup Dialog.

    Type enable ate the Router> prompt to go to privileged exec mode.

    Copy the startup configuration to the running configuration by using the configure memory or copy startup-config running-config commands. Do not type configure terminal. If you use the configure terminal command, you overwrite the configuration stored in NVRAM.

    View the configuration by typing write terminal or show running-config. View the configured line, vty and enable passwords. Any encrypted passwords need to be changed.

    Enter the configuration mode by typing configure terminal. Change the line of enable passwords as necessary.

    All interfaces are in a shutdown state. Issue the no shutdown command on every interface that is to be used.

    Type config-register 0x2102 to return the router to normal operation at the next reloads.

    Exit configuration mode by pressing Ctrl-Z

    Save your changes by typing write memory or copy running-config startup-config.

    Reload the router and verify the passwords.

  • Categories: Tips n Tricks | Leave a comment

    How to quickly repair your Mobile Phone dropped in water?

    Many of you get your mobile phone wet by one way or another. You worry as you mistakenly drop your mobile phone in water. It can also get wet if you are out in a heavy rain. However, there is no need to panic. It is possible to save your wet mobile phone by quickly repairing it. In order to save your mobile phone from water damage, you can consider these easy and simple solutions:

    Act rapidly :

    The first thing you have to do in order to save your wet mobile phone is to act rapidly. Quickly remove all the detachable parts as well as covers possible such as the back cover, battery, the SIM card, memory card etc. Next, take a piece of cloth or a tissue paper to wipe the excess water you are able to notice within the mobile phone. Make sure that you dry it completely. If you don’ t do this, the water inside the mobile phone will begin to evaporate and gather in places which will be difficult to reach.

    This will save your wet mobile phone and it will start working if it was under water for just a little while.

    Using a hairdryer :

    Take a hairdryer and begin drying the mobile phone while giving more consideration to the place where the battery is located. The battery housing usually consists of tiny holes to let in air (so giving more space for water) inside the mobile phone.

    Make sure that you are not holding the hairdryer very near to the mobile phone. Keeping it too close to the mobile phone may harm the electrical mechanism of the mobile phone. Keep on drying the mobile phone from a safe distance for about twenty to thirty minutes.

    If solution number 1 and solution number 2 don’t work, try solution number 3.

    Drying for a long time:

    Take off the covers as well as battery from the mobile phone. Put the phone in a dry as well as warm place to let the water inside the phone evaporate gradually from the little holes in the mobile phone.

    Categories: Tips n Tricks | Leave a comment

    Microsoft’s IE9 look leaks to the Web

    IE9
    A screenshot of Internet Explorer 9 briefly posted on Microsoft’s Russian Web site.


    Thanks to Microsoft’s Russian subsidiary, the world now has a pretty good idea of what Internet Explorer 9 will look like.

    The Russian folks were kind enough to briefly post an image and some details that had yet to be shared about the browser. And although they pulled it down, ZDNet blogger Mary Jo Foley captured the information and screenshot.

    More than anything else, the screenshot shows a browser that attempts to offer a minimalistic user interface and leave as much room as possible for the Web sites. When combined with the browser’s hardware acceleration, the hope is to pave the way for Web sites that are as application-like as possible.

    Microsoft declined to confirm the details Wednesday of what had been posted to its Russian site.

    However, the look is consistent with what IE team member Ryan Gavin told CNET earlier this month about the planned appearance of IE9.

    “The browser is the theater,” Gavin said in the interview. “We’re not the play.”

    The browser appears to go as far as to allow people to pin certain sites to the desktop and open them in their own windows without any clear indication that they are using IE at all. According to Foley’s Bing translation of the Russian site, there will be certain sites that are “recognized” or “protected” and can be pinned to the taskbar and launched with their own icons.

    Microsoft plans to release a beta of the browser at a September 15 event in San Francisco, although this latest leak clearly steals some of the thunder. Up to now, Microsoft had offered several technical previews of the underlying engine, but had yet to show or talk in detail about how the browser would look.

    The invitations for the event do mention “the beauty of the Web” and “unlocking the native Web.”

    Until now, though, the focus had been on several key features of the browser’s engine, including the hardware acceleration capabilities, improved JavaScript engine, and broader support for HTML5 and other standards. Microsoft first showed those features at the Mix10 event in March in Las Vegas, though it had talked about hardware acceleration as far back as last November’s Professional Developer Conference.

    The details on the Russian site reveal a browser that borrows much from Windows 7, including the ability to tear off browser tabs and have them “snap” to a particular part of the screen, similar to the way documents and applications already do in the latest version of Windows.

    There is also a unified search and address bar, something already seen in Google’s Chrome. However, having learned from criticism of Google–as well as its own considerable issues with regulators–I’m hearing that Microsoft will make the choice of whether to let the bar suggest sites as you type a completely opt-in affair.

    Courtesy : Cnet News

    Categories: News | Leave a comment