Okkoma Dewal Tricks

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 23 May 2012

MS DOS Font Color Change

Posted on 18:30 by Unknown
Do you want change your CMD Font color.then try this tips.


To do this follow these steps

1) Click on Start >Run then Type CMD

2) Command Prompt will open.


3) Type "color z"


4) List of numbers of colors will appear...Example: Green=2


5) So, for changing CMD color to Blue color type:-"color 2"and then press Enter.

Now you done.


Read More
Posted in Computer Tricks | No comments

Installing The Windows 8 Consumer Preview Step By Step

Posted on 14:30 by Unknown

Downloading the 2.5GB ISO image from Microsoft's website took me about 20 minutes, although that time can extend based on your Internet connection. The installation process itself—which I completed in a VMware Fusion virtual machine with about 1.5GB of RAM and one virtual CPU—was quite simple and took about 10 to 15 minutes.

First up, a betta fish (because it's a beta, after all)


Now we move into the installation process:



You'll have to enter a product key, of course. What would Windows be without the Windows activation process?


But instead of paying $200 for a license, all you have to do is grab the product key from the download page, as seen here:


Next, you'll agree to the Windows license terms, and select whether to do an upgrade or custom installation. The latter lets you choose which hard drive to use:


If you've installed Windows before, this screen will be quite familiar. This is the longest part of the installation, but it only took five minutes or so.


After installation, you'll see another betta fish, and then you can start personalizing your computer, starting with giving it a name and choosing a background color.


Now it's time to select installation settings.


If you select "custom," you'll go through options for sharing and connecting to devices; whether to automatically download updates and new device drivers; whether to send diagnostic information to Microsoft; whether to share information such as your name with applications; and whether to turn on the Windows Location Platform for location-based app settings. Here's an image of the settings for keeping your computer up to date and safe from viruses:


Now you can sign into the OS so that you can download applications from the new Windows Store and sync data across different computers.


You'll be asked to enter a mobile phone number, alternate e-mail address, and security question, so Microsoft can help you reset your password if you can't log in. After signing in, you'll finally be looking at Microsoft's brand-new Metro interface for Windows 8:


There's lots of stuff you can do in the Metro interface, such as accessing the Windows Store, and various applications such as Mail, SkyDrive, Photos, Internet Explorer, Xbox Live Games, and more. But if you find Microsoft's new tile-based setup overwhelming, you can switch back to the traditional desktop interface:


Now Installation is compleat.And now you've seen the Windows 8 installation process. As noted earlier, we'll have more articles on what it's like to use Windows 8 as the day goes on. Happy downloading and installing to all.



Read More
Posted in Computer Tricks, Windows 8 | No comments

How touch-sensitive devices work?

Posted on 11:30 by Unknown
Technologies of touch-sensitive devices to  control a computer are developed in two directions. First, the monitor can act as a measuring sensor and respond to the tip of your finger or other object and turn the touch into an electrical signal. monitor systems that respond to touch, are widely used in the management of automated counters and other movements that require gentle control. Another solution is to use plastic pads as measurement sensors. First, they were widely used with graphic panels, and today have become an integral part of many laptop computers. Movement of finger




rectangular pad stimulates identical run the cursor on the monitor. In most of these measuring senses moving fingers changes the distribution of electric voltage in switches of pad causing large differences in electrical signals. With the use of pads that respond to touch,moving cursor can reach the speed of up to 100 cm per second.

The system of touch-sensitive monitors - Electricity, released through the coating on the base layer of glass, produces a static electric field. Touching the monitors interfere with the field, and these changes the processor graphicaly displays.


1.Base layer of glass - The glass is coated with transparent electro enforceable material
2.Image Processor - The processor constantly scans an image of the electrostatic field. when changes occur in the image, processor makes calculation of coordinates.
3.The appearance of the electric field - a layer of conducting electricity with register changes in electrical voltage caused by touch.
4.The front layer of glass - the glass is electrically low voltage field that is changeable at the touch of a finger.

Read More
Posted in Computer Tricks | No comments

How hard disc works?

Posted on 08:30 by Unknown

The area of data storage is a set of flat plates coated with magnetized lining.Data is stored as a series of coordinated magnetized area inside lining, called "domains". To read the data or write, a device called an executive device moves heads to read or write to position, vertical compared to the disk, while the plates spinning at high speed. Then, the signals are sent to the head, or the head  receives signal, which records or reads data.



1.FAT - in one part of the disc, in space to store files, information about the location of all files on the disk are stored.
2.Head "write-read" - Head reads and writes data hovering 0.002 mm above the plate surface
3.Lever of executive devices - Each head is "read-write" device placed on the light handle that rotates around the pin at one end and runs heads harmonized
4.Data cable - Trough this cable data flow between the hard disk, and devices that we call the "Master Disc". This device manages plates spins and data flow between the heads, "read-write" and the opposite of it and the executive devices.
5.Block devices executive - executive device receives a continuous flow of instructions to run the "read-write" heads.It can start running heads up to 50 times per second.
6.Magnet
7.Movable coil - coil turns inside of the permanent magnet in the center of the executive device. When an electrical impulse reaches the coil, causes her turn, and this in return causes shift of the lever of executive device.
8.Sector - on each track there are several sectors
9.Step motor - This motor is turning plates with speed of several thousand spins per minute
10.Track - Before first use, magnetized coating on each panel shares on the concentric tracks using special signal from the computer, a process called formatting.
11.A set of plates - information is stored on both of their sides.


Read-write Head - Once the head is correctly positioned, the magnet on top of her sends electrical pulses to ensure that the data will be written into proper sector.Binar data (0 and 1), encoded by electric current direction change, turnin into harmonized patterns in the "domains". The data from the disc is read the reversing the procedure, ie the passage of "domain" below the electromagnet, which induces a current in the wire.


1.Electromagnet - When data is written to disk, electrical impulses arriving there, produce magnetic fields that align "domains" on the track below.
2.Wire - this wire transfer written or read data registered between "read-write" head and the supervisory mechanism of the disk.
3."Domains" with data - Each domain is arranged in one of two possible directions. Changing direction in relation to the previous position of "domains" means 1, and when there is no change means zero.
4.Freely ordered "domains" - Where on the disc were never even written data, "domains" are freely ordered.


Read More
Posted in Computer Tricks | No comments

How to Remove Your Facebook Account Permanently

Posted on 00:26 by Unknown
Facebook offers a convenient way to deactivate Facebook account. However, deactivation of Facebook does not completely and permanently the Facebook profile and accoucnt.

According to Facebook FAQ, deactivate Facebook account will render user’s profile and all information associated with it immediately inaccessible to other Facebook users. In other words, the account is effectively disappear from the Facebook service. However, the Facebook account is not been purged from Facebook’s servers. Instead, the profile information (friends, photos, interests, etc.) is saved, so that the account can be recovered and reactivated in future with the information intact if the user decides to do so, or regret on the deactivation decision.



Permanently delete the Facebook account will completely remove and purge all personally identifiable information associated with the Facebook account from Facebook database. This includes information like name, email address, mailing address, and IM screen name. However, do note that copies of some material (photos, notes, etc.) may remain in Facebook servers for technical reasons, but this material is disassociated from any personal identifiers and completely inaccessible to other users.
Facebook users who want to get rid of Facebook once and for what, and do not think that he or she will use Facebook again, Facebook provides a way to delete the account. Once Facebook account is deleted, it’s impossible to reactivate the account or retrieve any of the content or information previously associated in the account. There is no option for recovery once Facebook account is deleted.
To delete a Facebook account, log in to the Facebook account, and open this link then submit the “Delete My Account” 

Click on Submit button. Enter the password to confirm it’s your account, and the captcha security spam check. Then click on Okay button. An email will be sent to indicate that the Facebook account will be deleted in 14 days.


During the 14 days account deletion grace period, do not login or sign in to Facebook account, nor perform any action utilizing Facebook, such as Share on Facebook on Like in Facebook, or login and sign up to other websites by using Facebook Connect (Facebook user name and password credentials). Any interaction and usage of the Facebook account during the period will prevent the account from being deleted.
Alternative Method to Delete Facebook Account
If the above official method to delete the Facebook account fails, it’s also possible to email Facebook to request them to delete your Facebook account directly. The email address is:
privacy@facebook.com
Within a few days (allows up to a week), an email response should be sent by Facebook to confirm that the account has been permanently deleted.
If there is no response from Facebook, and you can still access your Facebook account or given an option to reactivate the account, try email Facebook again, with the following three email addresses:
privacy@facebook.com
support@facebook.com
info@facebook.com
The Facebook account is permanently deleted when user cannot login to the account anymore, and there is not message which offers user a chance to reactivate the Facebook account.so don't test this tricks on your original Facebook profile.




Read More
Posted in Facebook Tricks | No comments

Tuesday, 22 May 2012

HOW TO KNOW THE DATE & TIME OF INSTALLATION OF YOUR WINDOWS

Posted on 12:11 by Unknown

Input “systeminfo” command to it.

WAIT FOR INFORMATION TO GET LOAD..

Now you can look "original installation date" ......simple...enjoy
Read More
Posted in Computer Tricks | No comments

Speaking Notepad - Review

Posted on 11:57 by Unknown




Speaking Notepad is handy text editor with powerful text-to-speech capabilities.

Main features:

    Handy notepad with speaking capabilities

    Supporting DOC, RTF, HTML, PDF and text files

    Recording speech into WAV, MP3 or WMA sound files

    Choose one of dozens of different voices

    Change voice speed and pitch in one click

    Powerful bookmark system

    Type & Read function

    SAPI4 and SAPI5-compliant voices

    Large number of visual styles

    Smart Spell Checker

    Efficient work with hot keys

    User-friendliness and handy interface


Download

http://speaking-notepad-v3.2.fyxm.net/
Read More
Posted in Computer Tricks | No comments

Upside Down Facebook Status Update

Posted on 11:52 by Unknown
It's very easy & have to do simple steps...

Go to the website www.fliptext.org.
In the upper field type your status that you want to update and then click on Flip Text button.
Now in the lower field you will see flipped text of your status.



Copy it and update it as your status. 

If you want rename your computer folders with flipped text follow the same steps.

Read More
Posted in Computer Tricks, Facebook Tricks | No comments

How To Protect Your Word Files With Password

Posted on 11:44 by Unknown
We all use Microsoft Word to create documents.
and some times we dont want other people to access our documents
specially when you are on a shared computer in your company and you may have your certain secret data stored in your word document that should not be accessed by your boss or other employee’s.



To deal with such a situation Microsoft word 2007 integrated a security feature in Microsoft word so that you can password protect your files.


just follow these simple steps to make your document protected


Click on the Microsoft Office Button present on the top left corner of the window.
Now Click on the Save As option
Now a new window will pop up.
Click on Tools option at the bottom of the window.
Now you will have two options.
You can select either one or both options
One is Password To Open it will ask for the password every time the document is opened.
So to view the document you have to enter the password first.
Second is Password To Modify it will ask for the password every time somebody tries to modify the document.
Read More
Posted in Computer Tricks, MS Office | No comments

How To Repair Task Manager Disabled Problem

Posted on 05:38 by Unknown

It is due to some kind of virus/ trojan activity which normally disables the task manager.Now due to this problem when ever the user press alt+ctrl+del to launch windows task manager it gives an error saying “Task Manager is being disabled by your administrator”.


Solution:

To Enable the Disabled Task Manager on your system

1. Press window key+r to show run prompt
2. Follow the following steps

    Enter gpedit.msc in the run prompt and click OK
    In the Group Policy settings window
    Select User Configuration
    Select Administrative Templates
    Select System
    Select Ctrl+Alt+Delete options
    Select Remove Task Manager
    Double-click the Remove Task Manager option’.
    Set the property of this item as disabled.


For Those who use Windows XP Home Edition can use the registry to enable Task Manager

1. open start –> run and type regedit

2. Navigate to the following path:

Hive: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
3. You will find a registry key with name DisableTaskMgr of type: REG_DWORD
4. Double click the key with and set the Value to 0
5. Exit the registry and restart to see the effect.

Read More
Posted in Computer Tricks, Virus Tricks | No comments

How To Remove Autorun.inf Virus Using Command Prompt

Posted on 05:27 by Unknown
This file makes the drives not when we try to open it or when we try to rename the drive it won’t. This file is used by most of the virus authors to reside there work even after the user remove all the viruses from their computer. This file give lots of annoiences. Basically it usally used to call or run the viruses frequently. This file can also be used to work as i said above. To remove this type of files from your computer do the following steps:-


1. Click start and then run

2. Type cmd to open up the command prompt.
3. Change your directory to any on off your directory by using syntax driveletter: For example d:
4. Then type the command attrib in the prompt it display the list of executable files in the current directory.
5. Check whether autorun.inf file is present or not.
6. If not then you are lucky.
7. If present then you have to follow all the following steps to remove that file.
8. First you have to remove the power it is having for ex read only attribute etc…
9. The attribute depends on viruses.
10. One common step to remove all its properties is type the following command in the command prompt:-     attrib -s -h -r autorun.inf
11. -s to remove its system attribute, -h to remove its hidden attribute and -r to remove the read only attribute.
12. You can use this steps to remove any of the files which has this properties.
13. Remember before doing the above steps you have to remove all the viruses form your computer. I recommend avast home edition which is free and 100% perfect. If you haven’t clean the viruses first clean it because after you delete this file it will automatically creates it without your knowledge.
14. Then type the following command:-  del autorun.inf.
15. Now you have successfully deleted the file after you deleted the file restart your computer or remove your pendrive and plug it again.
In this way you can remove that file.

Read More
Posted in Computer Tricks, Virus Tricks | No comments

How To Delete khatra.exe , Xplorer.exe or gHost.exe virus Without Software

Posted on 05:27 by Unknown
1. Open Task Manager (If your task manager is blocked Click here) and click the process tab, found these process named regsvr.exe(if found there), gHost.exe, khatra.exe and Xplorer.exe, right click on all these process and select end process tree.



2. Open Start Menu –> Run, type cmd and click Ok button
3. Now Download and Install everything search tool http://praveenkumarg.blogspot.com/2009/06/fastest-search-engine-for-windows.html
Note:
It is one of the fastest windows Search Engine.

4. Run Everything and type the virus exe names one by one ( khatra.exe, gHost.exe, Xplorer.exe ) and delete all the copies found on your computer anywhere.
5. Now Open start menu –> run, type regedit (If registry editing is blocked Click here)
6. Press Ctrl+F and find the registry keys with names khatra,gHost,Xplorer and delete the values you find with these names.

Tht’s it your khatra.exe virus problem is fixed.Now your computer is clean.

Read More
Posted in Computer Tricks, Virus Tricks | No comments

Monday, 21 May 2012

windows xp admin password hacking through Guest Account

Posted on 07:55 by Unknown

admin account from a guest account by which you can reset the administrator Ever wanted to hack your college pc with guest account/student account so that you can download with full speed there ? or just wanted to hack your friend’s pc to make him gawk when you tell your success story of hacking ? well,there is a great way of hacking an administrator password and getting all the privilages an administrator enjoys on windows..Interested ? 


Concept

Press shift key 5 times and the sticky key dialog shows up.This works even at the logon screen. But If we replace the sethc.exe which is responsible for the sticky key dialog,with cmd.exe, and then call sethc.exe by pressing shift key 5 times at logon screen,we will get a command prompt with administrator privilages because no user has logged on. From there we can hack the administrator password,even from a guest account.

Prerequisites

Guest account with write access to system 32.

Here is how to do that -

* Go to C:/windows/system32
* Copy cmd.exe and paste it on desktop
* rename cmd.exe to sethc.exe
* Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click yes.
* Now Log out from your guest account and at the user select window,press shift key 5 times.
* Instead of Sticky Key confirmation dialog,command prompt with full administrator privileges will open.
* Now type “ NET USER ADMINISTRATOR aaa” where “aaa” can be any password you like and press enter.
* You will see “ The Command completed successfully” and then exit the command prompt and login into administrator with your new password.
* Congrats You have hacked admin from guest account.

Further..

Also, you can further create a new user at the command prompt by typing “NET USER XERO /ADD” where “XERO” is the username you would like to add with administrator privileges. Then hide your newly created admin account by -

Go to registry editor and navigate to this key

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList]

Here create a new DWORD value, write its name as the “user name” that u created for your admin account and live with your admin account forever :)

I hope that was informative..





Read More
Posted in Computer Tricks, Hacking Tricks, Windows XP | No comments

Sunday, 20 May 2012

How to Use CCleaner (Full Guide)

Posted on 09:26 by Unknown
There’s more to CCleaner than clicking a single button. This popular application for wiping temporary files and clearing private data hides a variety of features, from fine-grained options for tweaking the cleaning process to full drive-wiping tools.



CCleaner is easy for beginners to use – just launch it and click the Run Cleaner button. But there’s a lot more you can do with it.


Consider What You Delete

CCleaner clears a lot of stuff by default. You might want to reconsider clearing the browser caches (Temporary Internet Files for Internet Explorer). Browsers store these files on your system to speed up browsing in the future. When you revisit a site, the site will load faster if images and other files are cached on your system. Clearing these will free up some space and increase your browsing privacy, if you’re worried about that, but frequent cache cleanings can slow down your web browsing.




Erasing the thumbnail cache (under Windows Explorer) can also slow things down – if you open up a folder with a lot of image files, it will take some time to recreate the cache. Clearing it does free up space, but at the cost of recreating the cache later.
Many other options clear most-recently-used lists (MRUs) in Windows and other programs. These lists don’t take up much space, but can be privacy concerns – if there’s a most-recently-used list you rely on, be sure to uncheck it.



Whitelist Important Cookies

CCleaner clears all cookies by default, but you might want to keep some. If you find yourself always logging into your favorite websites after running CCleaner, open the Cookies pane in the Options section.
CCleaner can help you with this whitelisting – right-click in the Cookies pane and select Intelligent Scan. CCleaner will automatically add Google, Hotmail, and Yahoo Mail cookies to your whitelist.



You’ll probably want to add other cookies to the whitelist, too. For example, locate the howtogeek.com cookie in the list and click the right arrow button to add it to your whitelist. CCleaner will leave your How-To Geek cookie alone, so you don’t have to log back into How-To Geek after clearing your cookies.




Beware the Registry Cleaner

While CCleaner does include a registry cleaner, I’d recommend against running it. The Windows registry contains hundreds of thousands of entries; removing a few hundred (at most) won’t give you an increase in performance. Registry cleaners can accidentally remove important registry values, however, so there’s risk with little reward.


That said, if you’re dead set on running a registry cleaner, CCleaner is one of the safer ones. If you do run the registry cleaner, ensure you back up any changes you make. You can restore the deleted registry entries from the backup file if you encounter any problems.



Manage Startup Programs

The Startup panel in the Tools section allows you to disable programs that automatically run when your computer starts. To avoid losing an autostart entry that may be important, use the Disable option instead of the Delete option. You can easily re-enable a disabled autostart entry later.



Wipe Drives

When Windows or another operating system deletes a file, it doesn’t actually wipe the file from your hard disk. Instead, the pointers to the files are deleted and the operating system marks the file’s location as free space. File recovery programs can scan your hard disk for these files, and, if the operating system hasn’t written over the area, can recover the data. CCleaner can help protect against this by wiping the free space with its Drive Wiper tool.



While some people believe that multiple passes are necessary to irrecoverably delete files, one pass should probably be fine. If you’re disposing of a hard drive, you can also perform a full erase of all the data on the drive with this tool.
You can also have CCleaner wipe free space every time you run it by enabling the Wipe Free Space checkbox under Advanced in the Cleaner section. Enabling this option will make CCleaner take much longer to clean up your system – CCleaner recommends leaving it disabled.



Securely Delete Files

You can have CCleaner delete files securely, effectively using the Drive Cleaner tool on each file it deletes. Bear in mind that this is slower than deleting the files normally – that’s why operating systems don’t securely delete files by default. If you’re concerned about privacy, enable this option from the Settings tab in the Options section.



Include Custom Files

If you use a program that isn’t included in CCleaner’s list of applications, or you have a temporary file directory you want cleared regularly, you can specify custom folders and files in CCleaner. CCleaner will delete these files and empty these folders when you run it.
To add a custom folder or file, open the Options section and use the options on the Include tab. Be careful when adding folders or files; you could accidentally add important files or folders and lose them.


The custom files you specify here are only cleaned if the Custom Files and Folders checkbox under Advanced is enabled.




Exclude Files

Likewise, if CCleaner keeps clearing something you don’t want it to clear, you can add an exclusion in the Options section. You can exclude an entire drive, folder, file, or registry key. You can also restrict the exclusion to specific file extensions.



Manage Installed Programs

CCleaner’s tools include the Uninstall panel, which lists your installed programs. This panel includes a few more features than the default Windows one – you can rename or delete the entries here and any changes you make will also appear in the Windows Control Panel.
You can also save the list of installed programs to a text file – an easy way to keep a list of your installed programs in case you need to remember and reinstall them from scratch.



Once you’ve got CCleaner set up.
Read More
Posted in Computer Tricks, Software Tricks | No comments
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • Dead Space 3 Review
    Details About This Game :     Game : Dead Space 3     Platforms : PC, PS3, 360     Genre : Action     Publisher : Electronic Arts     Devel...
  • How To Make An Easy Clickable Link
    In this post i will show you how to make a text link or hyperlink. Making the link is very simple. This is how you would create a link direc...
  • Download Boot Camp Drivers Fot Windows 8
    Four months after the release of Windows 8, Apple has finally updated Boot Camp Assistant to add support for Windows 8. Yes, Boot Camp 5.0...
  • Avoiding Some Basic Problems during a Conference Call
    There is no hard and fast rule, when it comes to the usage of conference calls. Generally, there can be varied reasons for using conference ...
  • Acer Iconia Tab A700
    With the A700, Acer essentially took its Iconia Tab A510, slapped in a 1,920x1,200-pixel resolution screen and gave it a new name. Unfortuna...
  • Microsoft Genuine Licence Keys Part 02
    Microsoft Office 2000 Small Business Edition: CGGYH-6GF4P-J82Y8-CRXQ6-JKYHX B8F8H-9D2RY-WTRB7-VG7MW-95QM6 GFYPB-J6T84-VR7VJ-PZHPP-8PDMT TW2R...
  • Download UC BrowserHD For Windows 8
    Regardless of the editions of Windows 8, Internet Explorer is available in two versions: Internet Explorer for desktop and Internet Explor...
  • How To Import Photos From iPhone To Windows 8
    Apple iPhone is still one of the best smartphones out there and selling pretty well in spite of stiff competition from the beautiful Nokia...
  • Supertrailer - This week's best videos recut into one energizing video
    http://www.gamesradar.com/supertrailer-weeks-best-videos-recut-one-energizing-video/ Song: Playing with Danger (from Team Fortress 2) remix ...
  • Supertrailer - The best trailers of the week remixed into to make one dramatic montage
    Music is from the Rome 2 Total War trailer While most of us over here were thinking about lighting and/or watching fireworks on Wednesday fo...

Categories

  • 11inch
  • 19201200
  • 19Pin
  • 3615QM
  • 40L5200U
  • 44999
  • 64bit
  • 700Z7CH
  • about
  • Absolution
  • action
  • Activision
  • Adult
  • again
  • AirCurve
  • Alleged
  • almost
  • already
  • alternative
  • amazing
  • America
  • analyst
  • Android
  • Android Tricks
  • announced
  • announcement
  • Anticipated
  • Apple
  • Apple Tricks
  • Apples
  • arrives
  • Assassins
  • assembled
  • Avail
  • available
  • AW100
  • backers
  • backplate
  • Battery
  • being
  • Bentley
  • beyond
  • Black
  • Blizzard
  • Blogger
  • Blogger Gadget
  • Blogger Tricks
  • Bluetooth
  • brilliance
  • Buffalo
  • business
  • Business
  • camera
  • Camera
  • Canon
  • Canons
  • Carrier
  • cellular
  • Cellular
  • Challenge
  • Chicken
  • Chrono
  • Cisco
  • Close
  • Cloud
  • collaboration
  • com
  • combined
  • Comics
  • coming
  • Command
  • Computer Tricks
  • Concept
  • Concepts
  • Confirmed
  • Connect
  • Connector
  • Continental
  • Conundrum
  • Coolpix
  • Creed
  • Dawnguard
  • defeat
  • details
  • Diablo
  • doesnt
  • Double
  • dramatic
  • Droid
  • durable
  • E-Money
  • EA4500
  • Edition
  • energizing
  • EOS1D
  • Episode
  • Essentials
  • expansions
  • Facebook Tricks
  • Fantasy
  • Featured
  • features
  • Ferrari
  • figure
  • Final
  • first
  • footage
  • forget
  • Fourth
  • Freeform
  • Freeman
  • front
  • Gadgets News
  • Galaxy
  • Game News
  • gameplay
  • games
  • Gamesplanet
  • GamesRadars
  • GConnect
  • Google
  • Gordon
  • Grand
  • GreatCall
  • Griffin
  • GTechnology
  • Guardians
  • Guild
  • Hacking Tricks
  • HalfLife
  • HDPATU3
  • HE400
  • Headphones
  • HiFiMan
  • Hitman
  • holder
  • horrifying
  • Iconia
  • IdeaPad
  • Incredible
  • ingame
  • Innergie
  • Inspiration
  • Internet Tricks
  • iPhone
  • iSung
  • itself
  • Jelly
  • Jitterbug
  • Justice
  • Kickstarter
  • Killer
  • killing
  • launch
  • launches
  • leaked
  • Lenovo
  • Lexus
  • lifted
  • Limbo
  • Limited
  • Linksys
  • loads
  • Local
  • MacBook
  • Machines
  • Make Money
  • Marvel
  • Mazda
  • Micro
  • Microsofts
  • MiddleEarth
  • might
  • MiniStation
  • Mission
  • mobile
  • Mobile Tricks
  • Monster
  • montage
  • Mount
  • MS Office
  • News
  • Nexus
  • Nikon
  • North
  • October
  • offers
  • Online
  • Optimus
  • Other
  • Other Tricks
  • partially
  • parts
  • Payne
  • phone
  • phones
  • physics
  • planned
  • player
  • PlayStation
  • PocketCell
  • potential
  • power
  • Premium
  • Professional
  • Quantum
  • Quarters
  • Raider
  • ready
  • really
  • Rechargeable
  • recut
  • register
  • release
  • released
  • remixed
  • Remote
  • Resident
  • resolution
  • restrictions
  • revealed
  • review
  • Robot
  • roundup
  • Router
  • running
  • sample
  • Samsung
  • Sauron
  • season
  • September
  • sequel
  • Series
  • shows
  • Shure
  • silver
  • Skyrims
  • Smart
  • smashing
  • Sniper
  • sniping
  • Software Tricks
  • Something
  • Sonos
  • Special
  • sports
  • SRH1440
  • stirs
  • Studios
  • stuff
  • subway
  • Summer
  • Supertrailer
  • Tablet
  • Tacoma
  • teased
  • Technology
  • Tegra
  • Telltale
  • Theres
  • thickness
  • things
  • Thirds
  • Thunderbolt
  • today
  • Toshiba
  • Total
  • Touring
  • Toyota
  • trailer
  • trailers
  • Tricks
  • turning
  • unlocked
  • Unofficial
  • Unveiled
  • Valve
  • Verizon
  • video
  • videos
  • Virus Tricks
  • Walking
  • weeks
  • Which
  • Window
  • Windows
  • Windows 7
  • Windows 8
  • Windows Vista
  • Windows XP
  • winners
  • Wireless
  • zombie

Blog Archive

  • ►  2013 (6)
    • ►  April (6)
  • ▼  2012 (209)
    • ►  July (78)
    • ►  June (17)
    • ▼  May (89)
      • MS DOS Font Color Change
      • Installing The Windows 8 Consumer Preview Step By ...
      • How touch-sensitive devices work?
      • How hard disc works?
      • How to Remove Your Facebook Account Permanently
      • HOW TO KNOW THE DATE & TIME OF INSTALLATION OF YOU...
      • Speaking Notepad - Review
      • Upside Down Facebook Status Update
      • How To Protect Your Word Files With Password
      • How To Repair Task Manager Disabled Problem
      • How To Remove Autorun.inf Virus Using Command Prompt
      • How To Delete khatra.exe , Xplorer.exe or gHost.ex...
      • windows xp admin password hacking through Guest Ac...
      • How to Use CCleaner (Full Guide)
      • How To Create a CD autorun file
      • New KM Player Free Download
      • Burn a CD on Windows XP without using software
      • How To reduce Google Chrome Memory Usage
      • Internet Connection Sharing on Windows XP
      • Simplest & Best Way to Fix PC Errors
      • How to block and unblock internet sites....!
      • Windows Best Command Prompt Tricks & Hacks
      • Add The Administrative Tools Icon To The Desktop
      • Disable Windows Messenger At Windows Start-Up
      • How to Restart Windows without Restarting your PC
      • How to use your Pen Drive as RAM
      • Rip DVDs with VLC Media Player
      • Get multiple desktops Free software
      • How to Repair, Fix & Format USB Drives
      • Turn Your PC to Karaoke Player with Windows Karaoke
      • Shutdown Your Computer or a Remote Computer via Co...
      • How to increase Virtual Memory from 1-2 GB
      • How to Hack Windows Administrator Password
      • How Firewalls Work
      • HOW TO UPDATE BLANK STATUS ON FACEBOOK TRICK
      • How to copy files in write protected MMC or any re...
      • Keyboard Tricks That Few People Know About
      • How to download all files of a Website
      • Keyloggers
      • How to Trace Any IP Address
      • CREATE BOOTABLE USB PEN DRIVE
      • Steal Data from Computer to a USB or Pendrive
      • How to identify RAM stick just by looking them
      • HOW TO ACCESS WIKIPEDIA OFFLINE
      • SEND PROFILE PIC DURING CHATTING
      • WINDOWS 8 CONSUMER PREVIEW DIRECT DOWNLOAD LINKS W...
      • WINDOWS 7 USEFUL TOOL FOR USERS [Snipping Tool]
      • CHANGE YOUR COMPUTER PROCESSOR NAME PERMANENTLY
      • VIRUS TO FORMAT ENTIRE HARD DISK
      • HOW TO ENABLE 'GOD-MODE' IN WINDOWS 7
      • How do we create animated GIFs on android?
      • How to use VMware tools to Install Windows 8 on VM...
      • Write Protect Your USB Flash Drive
      • Trick to Display Windows Version on Desktop
      • Use VLC as a Video Cutter
      • How to add Hotmail and Live Email Accounts to Outl...
      • Windows 7 Tips, Tricks and Secrets
      • Add / Import Facebook Contacts to Gtalk Using Yaho...
      • How do you block websites in Windows for a specifi...
      • Add / Import Outlook Contacts to Skype Contacts
      • Error message on startup “Windows\System32\config\...
      • Make Free Calls on iPhone using WiFi 3G or MiFi
      • Use Facebook Chat Contacts with Yahoo Messenger
      • Add Mac-Like Dock To Windows 7 Taskbar-StandaloneS...
      • How to Convert a Power Point 2010 Presentation to ...
      • Facebook Photos Slideshow Generator : FB Widget
      • Get SMS Tones and Ringtones to iPhone without iTunes
      • Backup Facebook photos, videos, and text
      • Connect xBox 360 Live through Laptop or PC
      • Siri installation on iPhone 4 and iPod Touch
      • How to install windows 7 from USB drive
      • Facebook keyboard shortcuts
      • SIRI app for iPhone 4? Yes, It Works.
      • How To Remove Facebook Timeline And Get Back To Ol...
      • Windows 8 : Metro interface
      • Windows 8: Getting started, ARM and x86
      • Easiest Way Of Genuine Your Windows- 100% Works [G...
      • Some Important Tips to Setup a New Windows
      • How to hide a Hard disk Drive or partition in wind...
      • Microsoft Genuine Licence Keys Part 02
      • Microsoft Genuine Licence Keys Part 01
      • Make your Computer Welcome You
      • Make Folders With No Name
      • Windows 7 keyboard Shortcuts
      • Hidden Emoticons (Emotions) or Smileys in Yahoo! M...
      • The Simplest Way To Genuine Your WinXP
      • How To Rip DVD With SimpleDivx Tutorial
      • 14000 Serial Numbers
      • Folder Lock without any Software
    • ►  April (25)
Powered by Blogger.

About Me

Unknown
View my complete profile