BEFORE MARRIAGE:
Husband - Aaah! ...At last! I can hardly wait!
Wife - Do you want me to leave?
Husband - No! Don't even think about it.
Wife - Do you love me?
Husband - Of course! Always have and always will!
Wife - Have you ever cheated on me?
Husband - No! Why are you even asking?
Wife - Will you kiss me?
Husband - Every chance I get!
Wife - Will you hit me?
Husband - Hell no! Are you crazy?!
Wife - Can I trust you?
Husband - Yes.
Wife - Darling!
AFTER MARRIAGE: read from bottom to top.
Recent post Widget for Blogger
Posted by Richie S. | 11/14/2008 07:05:00 AM | Blogger | 0 comments »Here’s how you can make a Recent Posts widget for your Blogger blog:
1. Login to your Blogger Dashboard
2. go to your blog’s Layout, and click Add a Page Element
3. add a Feed (click “add to blog” under the page element Feed)
4. Configure Feed:
A. Enter your blog’s feed URL in the box. Use the URL below..
Just replace the text indicated in blue with your own blog address.
http://YourAwesomeBlogHere.blogspot.com/feeds/posts/default?alt=rss
or
http://www.YourAwesomeBlogHere.com/feeds/posts/default?alt=rss
(for self-hosted blogs)
B. Click Continue.
C. Change the Title to “Recent Posts” or “Recent Entries” or whatever you prefer to call it. You can also choose to show the item dates and author.
5. SAVE CHANGES. That’s it!
We all have downloaded that software (pirated) for that last seacond presentation, that never-can-miss soap, or just a good song. After searching for all sites, ultimately it comes to that last option, that virus laden-torrents!!
Torrents can be downloaded with softwares like torrnt, Bittorrent etc. Some of the terms used in this type of file transfer is given below.
availability
(also distributed copies) The number of full copies of the file available to the client. Each seed adds 1.0 to this number, as they have one complete copy of the file. A connected peer with a fraction of the file available adds that fraction to the availability, if no other peer has this part of the file. (ie. a peer with 65.3% of the file downloaded increases the availability by 0.653. However, if two peers both have the same portion of the file downloaded - say 50% - and there is only one seeder, the availability is 1.5).
choked
Describes a peer to whom the client refuses to send file pieces. A client chokes another client in several situations:
* The second client is a seed, in which case it does not want any pieces (ie. it is completely uninterested)
* The client is already uploading at its full capacity (ie. the value for max_uploads has been reached)
interested
Describes a downloader who wishes to obtain pieces of a file the client has. For example, the uploading client would flag a downloading client as 'interested' if that client did not possess a piece that it did, and wished to obtain it.
leech
A leech is usually a peer who has a negative effect on the swarm by having a very poor share ratio - in other words, downloading much more than they upload. Most leeches are users on asymmetric internet connections and do not leave their BitTorrent client open to seed the file after their download has completed. However, some leeches intentionally avoid uploading by using modified clients or excessively limiting their upload speed. The term leech, however, can be used simply to describe a peer - or any client that does not have 100% of the data.
peer
A peer is one instance of a BitTorrent client running on a computer on the Internet to which other clients connect and transfer data. Usually a peer does not have the complete file, but only parts of it. However, in the colloquial definition, "peer" can be used to refer to any participant in the swarm (in this case, it's synonymous with "client").
scrape
This is when a client sends a request to the tracking server for information about the statistics of the torrent, such as with whom to share the file and how well those other users are sharing.
seeder
A seeder is a peer that has a complete copy of the torrent and still offers it for upload. The more seeders there are, the better the chances are for completion of the file.
snubbed
An uploading client is flagged as snubbed if the downloading client has not received any data from it in over 60 seconds.
superseed
When a file is new, much time can be wasted because the seeding client might send the same file piece to many different peers, while other pieces have not yet been downloaded at all. Some clients, like ABC, Azureus, BitTornado, TorrentStorm, and µTorrent have a "superseed" mode, where they try to only send out pieces that have never been sent out before, making the initial propagation of the file much faster. This is generally used only for a new torrent, or one which must be re-seeded because no other seeds are available.
swarm
Together, all peers (including seeders) sharing a torrent are called a swarm. For example, six ordinary peers and two seeders make a swarm of eight.
torrent
A torrent can mean either a .torrent metadata file or all files described by it, depending on context. The torrent file contains metadata about all the files it makes downloadable, including their names and sizes and checksums of all pieces in the torrent. It also contains the address of a tracker that coordinates communication between the peers in the swarm.
tracker
A tracker is a server that keeps track of which seeds and peers are in the swarm. Clients report information to the tracker periodically and in exchange receive information about other clients to which they can connect. The tracker is not directly involved in the data transfer and does not have a copy of the file.
We all share our photos, videos, songs movies etc. And the most common form of sharing it is sending via email in the form of attachments. However most of the email clients we use allows a maximum of upto 10mb only (only Google mail- Gmail gives more than it- 20mb). That roughly translates to around 4-8 images. And no event consists of only 4-8 images. So how do you send it?
1)Well the most easy way is to compress it with WinZip, WinRar, 7Zip or something like that which would give you the option to fit in 1 more photo. If you are lucky, that is.
2)You could resize the images using the Windows inbuilt feature. Or you could use an image resizer.
3)The last and the best option is to upload the whole folder in many of the free file sharing sites like rapidshare. Of them the best ones are put in order.
1) Adrive.com (50GB free storage with other premium plans, excellent download speeds, sign-up required.)
2) Box.net (1GB free storage, Exellent site design, Good Download speed, sign-up required.)
3) Mediafire (Unlimited storage, excellent download, excellent speed, sign-up required)
4) Windows live spaces (5GB free, good speed download, sign-up required)
5) Filemail (2GB free, no sign-up required, files deleted after 3 days)
Check if antivirus is updating
Posted by Richie S. | 11/12/2008 05:58:00 AM | anti virus, Windows | 0 comments »This is trick to check your antivirus is working or not
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Open notepad..........Copy the above code in the file....then save it with the name
VIRUS.EXE
If this file got deleted immediately or Your Antivirus Recognise it as virus ....that means your antivirus is working n updated!!!
Trend Micro Internet Security 2008 (PC-Cillin) is an anti-virus cum anti-spyware software available for the Windows XP and Vista.
The software also includes a NetNanny like web filter to help you block websites that you think may be inappropriate for children.
Trend Micro just launched v. 2009 of their Internet Security suite but if you don’t need all the new features, here’s a chance to grab the previous version of Trend Micro Internet Security suite for free.
Just download the trial version of Trend PC-cillin software and use the following serial number to convert your trial into a full retail version.
PFEP-9991-7436-4997-1545
This is perfectly legit offer and is part of a promotion between Trend Micro and residential Internet customers of HTC ISP.
Thanks to Digital Inspiration
One of the main causes of computer slowing down at start-up is loading
of many application at the boot time.
An easy wan to disable them is
1) Goto to start
2) Run
3) Type msconfig
4) Goto start-up tab
5) Remove the tick for the app you want to disable and restart.
Caution: This is only recommended for advanced users only.
Many of us, in our endeavour to bring out the best in our blogs try and put as many tips or thoughts into a single post. Well this isn't particularly going to be welcoming to a person who has come for the first time to visit your site.
So here we are going to discuss a way in which you can trim the post and leave a 'Read more' link at the bottom. When the reader clicks on it the post will autimatically lenghten and the rest of the post will be visible. Again the reader has the oppurtunity to trim the post again with the summary only link at the bottom.
So lets get to the point:
1)Download and save your template so that you can go back to it if there is any problem with this hack (Important!)
2) Find the </head> tag in your template and add all the code from this page before it.
3) Find the includable called 'post' and copy/paste the changes highlighted in red in this page (Be very careful and avoid mistakes. Note that the word "uncustomized-post-template" may not appear in your template but that's fine. If such is the case then put a
</div>
tag before
<div style='clear: both;'/> <!-- clear for photos floats --> </div>
To find the includable, you could search for the term id='post'.
If you are not able to find it, you may not have expanded the template. Select the checkbox
named "Expand Widget Templates", which is right above the template code, to expand it into more
code.
4) Goto Settings->Formatting and at the bottom, you will find the text box provided to specify the "Post template". Copy/paste these lines into that text box and save the settings. (Please DON'T type these lines yourself because you might introduce some spaces that will break the functionality)
Type your summary here
<span id="fullpost">
Type rest of the post here
</span>
If you create a new post now, it shows you clearly where to type the summary and where to add the rest of the post. It is important to make sure that the /span tag above is at the end of the post. To ensure this, use Edit Html tab instead of Compose tab while typing the post. After typing, you can go to compose mode and change fonts/colors etc. Please note that you could also divide some (or all) of your old posts into summary and full post by editing them. The "Read more" link will appear only for the posts that have been divided like this.
You thought you knew windows?!
Posted by Richie S. | 11/01/2008 05:10:00 AM | Windows | 0 comments »You've read the reviews and digested the key feature enhancements and operational
changes. Now it's time to delve a bit deeper and uncover some of Windows XP's secrets.
1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).
2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run... and type 'gpedit.msc'; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care -- some may stop your
computer behaving as you wish. (Professional Edition only).
3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll,LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.
4. XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.
5. For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options -- they're all far too baroque to go into here.
6. XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother.
7. You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.
8. XP will treat Zip files like folders, which is nice if you've got a fast machine. On slower machines, you can make XP leave zip files well alone by typing 'regsvr32 /u zipfldr.dll' at the command line. If you change your mind later, you can put things back as they were by typing 'regsvr32 zipfldr.dll'.
9. XP has ClearType -- Microsoft's anti-aliasing font display technology -- but doesn't have it enabled by default. It's well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best
results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2.
10. You can use Remote Assistance to help a friend who's using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like 192.168.1.10. Replace this with your chum's real IP address -- they can find this out by going to www.whatismyip.com -- and get them to make sure that
they've got port 3389 open on their firewall and forwarded to the errant computer.
11. You can run a program as a different user without logging out and back in again. Right click the icon, select Run As... and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users,
but this can have unforeseen effects.
12. Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might slip the bonds of sanity before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Microsoft/Windows/Current
Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0.
13. You can start up without needing to enter a user name or password. Select Run... from the start menu and type 'control userpasswords2', which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatically Log On dialog box will appear; enter the user name and password for the account you want to use.
14. Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options... and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed.
15. XP comes with a free Network Activity Light, just in case you can't see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You'll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic.
16. The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.
17. You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By... Show In Groups.
18. Windows Media Player will display the cover art for albums as it plays the tracks -- if it found the picture on the Internet when you copied the tracks from the CD. If it didn't, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.
19. Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons.
20. Open up the Registry and go to : HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteComputer/NameSpace Under that branch, select the key : {D6277990-4C6A-11CF-8D87-00AA0060F5BF} and delete it. This is key that instructs Windows to search for Scheduled Tasks. If you like you may want to export the exact branch so that you can restore the key if necessary.This fix is so effective that it doesn't require a reboot and you can almost immediately determine yourself how much it speeds up your browsing processes.
Lots of blogs are being redirected to other sites to attract traffic. These blogs usually have a title designed to attract attention and when viewers click on the blog link they are redirected to other sites.....
The importance of redirection lies in the fact that your own blog may be hacked and all traffic redirected to other sites. To avoid this it is important to see the methods used for redirection.
HTML REDIRECTION
First login to blogger ,click on layout under the blog name, then click on Edit Html.
You may want to download the template to restore it if any errors happen.
This is the method used in the above example. The following code is used :
This code is pasted in the blog post or in the section of the template. This causes the blog to redirect to http://site.com/page.html even when the browser has Javascript disabled. To delay the redirection a number is put after the "content=" like this :
The delayed redirect has the advantage that you can place an extra message, such as “The page you are looking for changed location… You will be redirected automatically to the new location”
JAVASCRIPT REDIRECTION
This is the other method used. It does not work if Javascript is disabled in viewer's browser. The following code is pasted in the section of the template.
EXTERNAL JAVASCRIPT can also be used to redirect your blog. The way this works is that you may wish to incorporate a hack in your blog. You are then asked to paste this line above the tag in your template :
The jshack.js file is located at http://URL OF HACK SITE/ and contains the redirect code. You can see the full code when you type the whole address for the file in the address bar and press Enter.
To prevent this type of redirection do not add such codes in your template unless they come from a trusted site. You can also download the JS file and add the whole code instead of a link to the file.
JAVASCRIPT ALERT REDIRECTION
You can alert your viewers that they are being redirected using this Javascript code :
To use a confirm dialog use this code :
Create files and folders without any name
Posted by Richie S. | 10/14/2008 11:37:00 AM | 0 comments »This trick will allow you to create files and folders without any name.
Just follow the following steps:
1.Select any file or folder.
2.Right click on it,press rename or simply press F2.
3.Press and hold the alt key.While holding the Alt key,type numbers 0160 from the numpad.
Note:Type the numbers 0160 from the numpad,that is,the numbers present on the right side of the keyboard.Dont type the numbers which are present on top of the character keys.
4.Press Enter and the nameless file or folder will be created.
Reason:The file or folder that seems nameless is actually named with a single space.
But what if you want to create another nameless file or folder in the same directory ?
For this you will have to rename the file with 2 spaces.Just follow these steps below:
1.Select file,press F2.
2.Hold alt key and type 0160 from the numpad.
3.Release the alt key.Now without doing anything else,again hold alt key and press 0160.
4.Press enter and you will have second nameless file in the same directory.
5.Repeat step 3 to create as many nameless files or folders in the same directory
Simple Tweaks to Improve the Speed of your Windows PC
Here are four simple tweaks for your PC that will help improve your overall computing and internet browsing experience.
Step 1: Change the IE Concurrent Download Limit - Internet Explorer’s default settings only enable you to download up to two downloads at the same time. Optimizing the download settings enables you to download up to 16 files concurrently from the same server.
Method - Open registry editor and navigate to the following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Right click the right pane and select New->DWORD Value. Type MaxConnectionsPer1_0Server and give it a value of 16. Add another DWORD using the same process - call it MaxConnectionsPerServer with the same value - 16.
Step 2: Disable Windows Indexing Service - The indexing feature consumes system resources, and may adversely affect your system’s performance. By disabling the indexing feature, you free up disk space on your computer and may improve its performance.
Method - Goto Control Panel -> Administrative Tools -> Services. Find the Indexing Service, right click and select “Disable”.
Step 3: Resize your Internet Explorer Cache - The default cache settings of IE are configured to hold a large number of cached temporary Internet files. However, storing many small files on your hard disk consumes valuable disk space and can cause disk fragmentation. Reduce the maximum size of IE cache to 128MB for optimal performance.
Method - Start Internet Explorer, Select Tools -> Internet Options ->General. Under Temporary Internet Files click the Settings button and type the amount of disk space to use.
Step 4: Windows Menu Display Speed - Menus are displayed on your computer according to Windows’ default settings. By optimizing these settings, you speed up your computer’s ability to display (and hide) these menus.
Method - Goto Start -> Control Panel -> System. Click the Advanced tab, and under Performance, click the Settings button. Clear the Fade or slide menus into view check box, and then click OK.
These excellent suggestions are based on a local optimization report generated by a tuneup utility that’s available for Dell machines.
To change Drive Letters:
Go to Start > Control Panel > Administrative Tools > Computer Management, Disk Management, then right-click the partition whose name you want to change (click in the white area just below the word "Volume") and select "change drive letter and paths."
From here you can add, remove or change drive letters and paths to the partition.
1)Improving the Slow Boot up time:
There are a variety of reasons why your windows XP system would boot slowly. Most of the times it this has to do with the startup applications. If you would like to speed up the bootup sequence, consider removing some of the startup applications that you do not need. Easiest way to remove startup apps is through System Configuration Utility. Go to Start then Run and enter MSCONFIG and go to the Startup tab. Deselect/UnCheck application( s) that you do not want to startup at boot time.
2)Customize Logon prompt with your Own Words:
Open Registry by going to Start then Run, entering regedit and Navigate to [HKEY_LOCAL_ MACHINE\SOFTWARE \Microsoft\ Windows NT\CurrentVersion\ Winlogon] . In right pane, look for key by the name "LogonPrompt" . Set its value to whatever text you want to see displayed at login screen.
3) Find IP address of your connection:
Go to Start then Run. Enter 'cmd' and then enter 'ipconfig' .Add the '/all' switch for more info .
1)Recover 20% bandwidth:
To get it back:
Click Start then Run and type " gpedit.msc" without quotes.This opens the group policy editor. Then go to:
Local Computer Policy then Computer Configuration then Administrative Templates then Network then QOS Packet Scheduler and then to Limit Reservable Bandwidth.
Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab i.e."By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.It works on Win 2000 as well.
2)Renaming The Recycle Bin icon:
To change the name of the Recycle Bin desktop icon, click Start then goto Run, write Regedit and press Enter. It opens Registry Editor. Now in Registry Editor go to:
HKEY_CLASSES_ ROOT/CLSID/ {645FF040- 5081-101B- 9F08-00AA002F954 E}
and change the name "Recycle Bin" to whatever you want (don't type any quotes).
Managing Tasks:
You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.
3)Removing Shared Documents folder From My Computer window:
Open registry editor by going to Start then Run and entering regedit. Once in registry, navigate to key
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ My Computer \ NameSpace \ DelegateFolders
You must see a sub-key named {59031a47-3f72- 44a7-89c5- 5595fe6b30ee} . If you delete this key, you have effectively removed the my shared documents folder.
1)Deleting System Softwares:
XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/ sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.
2)Creating Shutdown Icon or One Click Shutdown:
Navigate to your desktop. On the desktop, right-click and go to New, then to Shortcut (in other words, create a new shortcut). You should now see a pop-up window instructing you to enter a command line path.
Use this path in "Type Location of the Item"
SHUTDOWN -s -t 01
If the C: drive is not your local hard drive, then replace "C" with the correct letter of the hard drive. Click the "Next" button. Name the shortcut and click the "Finish" button. Now whenever you want to shut down, just click on this shortcut and you're done.
Private Character Editor
This program is for designing icons and Characters(Alphapet)
Click :start
Then :run
type :EUDCEDIT
2) iExpress
This Program is for converting your files to EXECUTABLE files
Click : start
Then : run
type : iexpress
3)Disk Cleanup
This program used for cleaning harddisk to offer space
Click : start
Then : run
type : cleanmgr
4)Dr Watson
This program Is for repairing problems in Windows
Click : start
Then : run
type : drwtsn32
5)Windows Media Player 5.1
Opens the old media player
Click : start
Then : run
type : mplay32
Magic in Windows!! did u know this??
Posted by Richie S. | 10/14/2008 11:15:00 AM | Fun | 0 comments »Magic in Windows!! did u know this??
MAGIC #1
An Indian discovered that nobody can create a FOLDER anywhere on the computer which can be named as "CON". This is something pretty cool...and unbelievable... At Microsoft the whole Team, couldn't answer why this happened!
TRY IT NOW, IT WILL NOT CREATE " CON " FOLDER
MAGIC #2
For those of you using Windows, do the following:
1.) Open an empty notepad file
2.) Type "Bush hid the facts" (without the quotes)
3.) Save it as whatever you want.
4.) Close it, and re-open it.
Is it just a really weird bug? :-??
MAGIC #3
Microsoft crazy facts
This is something pretty cool and neat...and unbelievable... At Microsoft the whole Team, including Bill Gates, couldn't answer why this happened!
It was discovered by a Brazilian. Try it out yourself...
Open Microsoft Word and type
=rand (200, 99)
and then press ENTER
Then see the magic......
One of the things that we do the most is to install a number of applications, be it free, trial, shareware or a cracked one (yes I do it as well). And while uninstalling certain entries of the application remains in our computer's registry.
The computers registry is like a dairy of the computer which stores information about the application in.
When such entries remain behind the performence of the computer weakens, as the computer has to even load these useless entries as it is present over there.
CCleaner is an application that does that and much more. It cleans out the recycle bin, clears the recent documents list, the start menu list, recent documents in many apps like Firefox, Internet Explorer(IE), etc.
Besides that it also has a start-up manager as well as an uninstall manager.
For more features click on the read more link below.
Program Summary:
CCleaner is a freeware PC optimization tool.
It combines a system cleaner that removes unused and temporary files from your system and also a fully featured registry cleaner!
CCleaner allows Windows to run faster, more efficiently and gives you more hard disk space.
The best part is that it's Small, Fast and Free!
Cleans the following Windows components:
* Internet Explorer
- Temporary File Cache
- URL History
- Cookies
- Hidden Index.dat files
- Last download file location
* Firefox
- Temporary File Cache
- URL History
- Cookies
- Download manager
* Recycle Bin
* Clipboard
* Windows Temporary files
* Windows Log files
* Recent Documents (on the Start Menu)
* Run history (on the Start Menu)
* Windows XP Search Assistant history
* Windows XP old Prefetch data
* Windows memory dumps after crashes
* Chkdsk file fragments
Advanced Options allow cleaning of:
* Menu Order cache
* Tray Notifications Cache
* Window Size and Location Cache
* User Assist history
* IIS Log Files
* Custom Folders
Application Cleaning:
As well as cleaning up old files and settings left by standard Windows components, CCleaner also cleans temporary files and recent file lists for many applications. Including:
* Firefox, Opera, Safari, Media Player, eMule, Kazaa, Google Toolbar, Netscape, Microsoft Office, Nero, Adobe Acrobat Reader, WinRAR, WinAce, WinZip and more...
Registry Cleaning:
CCleaner uses an advanced Registry Cleaner to check for problems and inconsistencies. It can check the following:
* File Extensions
* ActiveX Controls
* ClassIDs
* ProgIDs
* Uninstallers
* Shared DLLs
* Fonts
* Help File references
* Application Paths
* Icons
* Invalid Shortcuts and more...
Safety:
CCleaner was designed from the ground to be safe and secure to use. It has multiple levels of checks in place to ensure that it cannot delete any useful information or documents you may still need. We also certify that it contains no Spyware or Adware.
High Security:
For the super cautious users we also offer secure file erasing. By overwriting the files before deleting them, making it impossible to recover the data.
Multiple Languages:
Thanks to the translators, CCleaner is available in 35 different languages:
English, Albanian, Arabic, Bosnian, Bulgarian, Catalan, Chinese (Simplified), Chinese (Traditional), Czech/Slovak, Danish, Dutch, Finnish, French, Galician, German, Greek, Hebrew, Hungarian, Italian, Japanese, Korean, Lithuanian, Macedonian, Norwegian, Polish, Portuguese, Portuguese (Brazilian), Romanian, Russian, Serbian Cyrillic, Serbian Latin, Slovak, Spanish, Swedish and Turkish.
Grab the latest version over here.
One thing that I would like to bring to your attention, is that this very light, fast, small software is completely free.