Friday, 25 March 2011
list of the secret codes of the android
List of the Secret codes of Android :
Secret Codes of Android Mobile phone it helpful to any person who dont know about the codes in the your regular using smartphone that are powered by the Android google trademarks.
There are the some secret codes :
Android |
1) *#06# For checking IMEI(international Mobile Equipment Identity)
2) *#7780# Reset to factory settings
3) *#0000# To view software version
4) *#2820# Bluetooth device address
5) *#746 Shows if ur sim 025625# Sim clock allowed status
6) #pw+1234567890+1#as any restrictions
7) *#732874826337378# Reset Security Code .
Samsung Mobile Codes
1) *#9999# or *#0837# for software version
2)*#6# For IMEI
3)*#9998*246 for battery status and memory status
4)*#9125 for smiley
5)*#89998778# for Display simcard information .
6)8#2222# for hardware version .
Samsung Android Codes
1) *#*#4636#*#*- Display information about the phone , battery and usage statistics
2)*#*#7780#*#*-Reset your Factory to Default
3)*2767*3855#-Reinstall the phone firmwares
4)*#*#34971539#*#*-Show Complete information about the camera
5)*#*#7594#*#*-Changing the power button behaviour
6)*#*#273283*255*663282*#*#*-for a quick backup to all your media files
7) *#*#197328640#*#*-Enabling the test mode of service activity
8)*#*#232339#*#*- Wireless lan test 9)*#*#232338#*#*-Display Wi-fi Mac address 10)*#*#1472365#*#*-For a quick gps test 11)*#*#0283#*#*-Packet look up test 12) *#*#0673#*#* OR *#*#0289#*#*- Audio Test 13)*#*#0842#*#*-Vibration test 14) *#*#2663#*#*-Display touch screen version test 15) *#*#2664#*#*- Touch Screen test 16)*#*#0588#*#*-Proximity Sensor test 17) *#*#3264#*#*-Ram version of system 18) *#*#8255#*#*-Google Talk service monitoring 19)*#*#8351#*#*-Enable voice logging mode 20) *#*#8350#*#*-Disable voice logging mode These are simple list of the secret codes hidden in the android operating system . try it . |
how to protect microsoft word document with password
How to Protect Microsoft Word Document With Password
Protect the Microsoft word document form the unauthorized person with the password . Anyone cannot able to read or modify your document without your permissions . Every unauthorized person need password to open the document . if person applied correct password on the document then your document will open to modify or changes . if password entered UN-correct then your document should be protected from the unauthorized use . Without password your document becomes read only functionality .
How to Set your Password on the Microsoft Word it is simple to set the password in Microsoft word document . Follow the Simple Steps for make your document password protected .
Step 1 : Open the word document that you wanted to protect from unauthorized used.
Step 2 : Go to Prepare and Click on the Encrypt Document and Set the password .
Encrypt Document Dialog box and Password Box , Type the Password Hard that you remember easily . In Microsoft Word You can make password up to 255 characters or by default you uses AES 128-bit advanced Encryption . Encryption is the standard method used to make your file more secure .
Step 3 : Confirm the Password and Re- Enter the Password to protect your document .
Password Protected |
Step 5 : if you want to modify your old password Go to General Option and under file sharing modify the password . Enter the password and re-enter the password to make your document save .
These are very easy step to protect your microsoft word document with the password .
Tuesday, 22 March 2011
Names of the commands that are used in command prompt
Name of the Command That are Used in Command Prompt
This is a list of command prompt command listCommand Prompt |
If you want to know commands used in Command Prompt, just type "help" and you will get the following commands with their description.
ASSOC Displays or modifies file extension associations.
AT Schedules Commands and programs to run on a computer.
ATTRIB Displays or changes file attributes.
BREAK Sets or clears extended CTRL+C checking.
CACLS Displays or modifies access control lists (ACLs) of files.
CALL Calls one batch program from another.
CD Displays the name of or changes the current directory.
CHCP Displays or sets the active code page number.
CHDIR Displays the name of or changes the current directory.
CHKDSK Checks a disk and displays a status report.
CHKNTFS Displays or modifies the checking of disk at boot time.
CLS Clears the screen.
CMD Starts a new instance of the Windows command interpreter.
COLOR Sets the default console foreground and background colors.
COMP Compares the contents of two files or sets of files.
COMPACT Displays or alters the compression of files on NTFS partitio
CONVERT Converts FAT volumes to NTFS. You cannot convert the
current drive.
COPY Copies one or more files to another location.
DATE Displays or sets the date.
DEL Deletes one or more files.
DIR Displays a list of files and subdirectories in a directory.
DISKCOMP Compares the contents of two floppy disks.
DISKCOPY Copies the contents of one floppy disk to another.
DOSKEY Edits command lines, recalls Windows commands, and creates m
ECHO Displays messages, or turns command echoing on or off.
ENDLOCAL Ends localization of environment changes in a batch file.
ERASE Deletes one or more files.
EXIT Quits the CMD.EXE program (command interpreter).
FC Compares two files or sets of files, and displays the differ
between them.
FIND Searches for a text string in a file or files.
FINDSTR Searches for strings in files.
FOR Runs a specified command for each file in a set of files.
FORMAT Formats a disk for use with Windows.
FTYPE Displays or modifies file types used in file extension assoc
GOTO Directs the Windows command interpreter to a labeled line in
batch program.
GRAFTABL Enables Windows to display an extended character set in grap
mode.
HELP Provides Help information for Windows commands.
IF Performs conditional processing in batch programs.
LABEL Creates, changes, or deletes the volume label of a disk.
MD Creates a directory.
MKDIR Creates a directory.
MODE Configures a system device.
MORE Displays output one screen at a time.
MOVE Moves one or more files from one directory to another direct
PATH Displays or sets a search path for executable files.
PAUSE Suspends processing of a batch file and displays a message.
POPD Restores the previous value of the current directory saved b
PRINT Prints a text file.
PROMPT Changes the Windows command prompt.
PUSHD Saves the current directory then changes it.
RD Removes a directory.
RECOVER Recovers readable information from a bad or defective disk.
REM Records comments (remarks) in batch files or CONFIG.SYS.
REN Renames a file or files.
RENAME Renames a file or files.
REPLACE Replaces files.
RMDIR Removes a directory.
SET Displays, sets, or removes Windows environment variables.
SETLOCAL Begins localization of environment changes in a batch file.
SHIFT Shifts the position of replaceable parameters in batch files
SORT Sorts input.
START Starts a separate window to run a specified program or comma
SUBST Associates a path with a drive letter.
TIME Displays or sets the system time.
TITLE Sets the window title for a CMD.EXE session.
TREE Graphically displays the directory structure of a drive or p
TYPE Displays the contents of a text file.
VER Displays the Windows version.
VERIFY Tells Windows whether to verify that your files are written
correctly to a disk.
VOL Displays a disk volume label and serial number.
XCOPY Copies files and directory trees.
How make computer speak what you write on it
How make computer speak what you write on it
Here is a one simple to computer speak what you write on the computer using this simple trick you are able to listen the file what you write on it . it really simple and awesome trick . By follow the step your trick is ready to use .Follow these steps for the trick usable
Step 1. Open a note pad and write the command createobject("SAPI.spvoice").speak " write there what ever u want that your computer speaks "
Step 2. Then save the note pad with any name with extension ".vbs" as shown
Step 3. Then note pad file will appear like this..
Step 4.After that right click on that folder than press open it will what ever u write in the inverted comma ......
hope u like it...
Sunday, 20 March 2011
How to Create a Invisible Folder .
How to create a invisible folder in windows pc
How to create a invisible folder on the windows to hide your personal information from the someone . it is awesome trick that help you to hide your personal data from the friends and family members to make your your folder private from the use of some one without your permission . its very simple this time follow my steps to hide your personal information . By follow my simple step of direction for how to safe your personal information from the some guest . After follow all the step you are able to hide and invisible your private information . By making Simple instruction you will able to make your folder invisible without name .
Step : 1 Right Click and Select New Folder to create new folder in pc in which place you needed .
Step : 2 Now Rename the Folder Using Press and Hold ALT and write 0160 after clicking rename that will make your File Name to No Name(without name).
Step : 3 AFter second step your File have no name .
Step : 4 Then Right Click on the Folder then go to the properties and customise click and change icon and click on the Blank icon .
Step : 5 After that your file have invisible without name . make it hidden by selecting hidden on properties .
Step : 6 if you want back file than show hidden folder and select the invisible folder icon change again and rename the file .
.
.
.
.
Enjoy the Trick.
Thanks
Comment and Share .
Saturday, 19 March 2011
list of the top search engine in the world
List of the Top Search Engine in the World :
Search Engine are online huge database of the collection of webpages and domain list . Show specific result to the user from the database it helps to get business from the search engine . Search Engine is very Helpful to find the billions of online identity from all over the world . Search Engine find and returns the relevant website , images and real time results from the web . Search engine use spider and crawler to index the web page to their database engine it index the web pages keywords , descriptions , links from the single web pages . Many Search engine can rank the website according to their traffic.
A Web page rank depend on the following few factors :
1.The frequency and location of keyword within the webpages .
2.How long page are existed on the web .
3.The number of web page link to the page . We call backlinks that give links back to our page .
These are the top search engine over the world :
1.
Baidu: www.baidu.com
2.
Bing: www.bing.com
3. Duck duck go : https://duckduckgo.com/
4.
Exalead http://www.exalead.com/search/
5.
Gigablast www.gigablast.com
6.
Google www.google.com
7.
Munax www.munax.com
8.
Qwant www.munax.com
9.
Sogou: www.sogou.com
10.
Soso.com : www.soso.com
11.
Yahoo: www.yahoo.com
12.
Yandex: www.yandex.com
13.
Youdao: www.youdao.com
14.
Faroo: www.faroo.com
15.
Seeks :http://rseek.org/
16.
Yacy: www.yacy.net
17.
Blingo:http://search.pch.com/
18.
Yippy :www.yippy.com
19.
Deeperweb: www.deeperweb.com
20.
Dogpile : www.dogpile.com
21.
Excite : www.excite.com
22. wow : www.wow.com
23.
Hotbot : www.hotbot.com
24.
Info.com www.info.com
25.
Ixquick www.ixquick.com
26.
Mamma www.mamma.com
27.
Metacrawler www.metacrawler.com
28.
Webcrawler www.webcrawler.com
29.
Accona www.accona.com
30.
Ansearch www.ansearch.com.au
31.
Biglobe http://www.biglobe.ne.jp/
32.
Daum http://www.daum.net/
33.
Egerin www.egerin.com
34.
Goo www.goo.ne.jp
35.
Leit.is http://leit.is/
36.
Najdi.si http://www.najdi.si/
37.
Naver www.naver.com
38.
Rambler www.rambler.ru
39.
Rediff www.rediff.com
40.
Sarch.ch www.search.ch
41.
Sesam www.sesam.io
42.
Seznam https://www.seznam.cz
43.
Walla www.walla.co.il
44.
Sophia search www.sophiasearch.com
45.
Swoogle http://swoogle.umbc.edu
46.
Cuil www.cuil.pt
47.
All the web www.alltheweb.com
48.
Lycos www.lycos.com
49.
Aol search www.aol.com
50.
Exalead www.exalead.com
51.
Zoo www.zoo.com
52.
Ask www.ask.com
53.
Jayde www.jayde.com
54.
Entireweb www.entireweb.com
55.
ASR www.activesearchresults.com
56.
Startpage www.startpage.com
57.
Visvo www.visvo.com
58.
Anoox www.anoox.com
59.
Web squash www.websquash.com
60.
Scrub the web www.scrubtheweb.com
61.
Fyber search www.fybersearch.com
62.
Exactseek www.exactseek.com
63.
Jayde www.jayde.com
64.
Mixcat www.mixcat.com
65.
Ghetto search www.ghettosearch.com
66.
Feedplex www.feedforall.com
67.
Searchsight http://www.searchsite.com/
68.
Amidalla www.amidalla.de
69.
Spiffysearch www.spiffysearch.com
70.
Ecosia https://www.ecosia.org
71.
Alexa www.alexa.com
75. buscopio- www.buscopio.net
76. arabo www.arabo.com
77. 4arabs-www.4arabs.com
78. unabot www.unabot.com
79. egyptsearch www.egyptsearch.com
80. domotom www.domtomfr.com77. 4arabs-www.4arabs.com
78. unabot www.unabot.com
79. egyptsearch www.egyptsearch.com
83. zatka www.zatka.com
84. Zapmeta www.zapmeta.com
85. my india www.my-india.net
86. geres www.dir.geres.ge
87. bangladesh search www.bangla2000.com
88. locate india www.locateindia.com
87. bangladesh search www.bangla2000.com
88. locate india www.locateindia.com
89. viesearch www.viesearch.com
This is the list of world top search engine . if you know some other add on comment .
how to protect usb drive from vrus when attached to infected computer.
How to Protect Usb from Virus attack if Attached to the infected Computer
We use Pen drive to transfer the data from one pc to another in our regular days of work . Sometime we attached over usb drive to some infected desktop pc that are harmful for the data transfers . Because of the Virus come from the infected system we are unable to find our useful files from the usb drive . Usb drive get virus infected very fast we need to protect them from the virus and other malware programs .Flash drives are so popular and most widely used to move data between computers, they are the prime target for attackers as a means to get infections spread around the computer world. Also, since USB drive is not a Read-Only Memory (ROM), the data inside it can easily be modified or deleted by malware programs.
Pendrive |
This can be done by adding a small entry to the Windows registry which acts as a switch that can be enabled to make use of the write protection or disabled to allow write access. Just follow these steps:
1. Open the Registry Editor (Open the “Run” dialog box, type regedit and hit “Enter”).
2. Navigate to the following Registry key:
HKEY_LOCAL_MACHINE\SYSTEM\ CurrentControlSet\Control\
3. Create a New Key named as StorageDevicePolicies. To do this right-click on Control, and click on New->Key and name it as StorageDevicePolicies.
4. Now right-click on StorageDevicePolicies and create a New->DWORD (32-bit) Value and name it as WriteProtect.
5. Double-click on WriteProtect and set the Value data to 1.
Now the right-protection for USB drives is enabled on your computer (no restart required) and thus it would not be possible for anyone or any program to add/delete the contents from your USB flash drive. Any attempt to copy or download the files onto the USB drive will result in the following error message being displayed.
To revert and remove the write-protection, all you need to do is just change the Value data for WriteProtect (Step-5) from 1 back to 0. Now write access to all the USB devices is re-enabled.