Saturday, February 13, 2010

The History Behind Valentine's Day





On 14 February we celebrate Saint Valentine’s Day, usually by the way of exchanging cards, sweets, lingerie, flowers or jewelry.

But, what exactly are we celebrating, is it just a holiday the retail stores invented to get our money? One could think so, but no, we are actually celebrating a Christian Holiday, Saint Valentine’s.

We are following a Christian and ancient Roman tradition. By now the Catholic Church recognizes three Saints by the name of Valentine, or Valentinus.

The first legend to the background of the celebration of Valentine’s Day is this:

During the 3rd century a priest by the name of Valentine, under Claudius II in Rome, secretly disobeyed the law.

Claudius had come to believe that a single soldier was a better soldier than a married young man and so decided to outlaw marriage in order to have plenty young strong men with no wives at his disposal.

Valentine, the priest, did not obey this law and continued to celebrate the holy bond of marriage for young couples in secrecy.

Of course, the way it always works with secret clauses, he was caught and sent to his death.

The second legend believes that Valentine was a prisoner who fell in love with a young woman, who came to see him often. It is believed that she was his jailors daughter. Before his untimely death he wrote her a love letter, signed with ‘Your Valentine’. There fore the phrase ‘Be my Valentine’.

Some believe he was beheaded, others thought that he died of sickness.

No one is even sure if 14 February was the day of his birth or his death or if it had indeed anything to do with Saint Valentine at all. The only thing that is for sure, is that the Romans had a tradition in the middle of February, which would mark the 14th, called the Love Lottery. It was believed that spring and with it the renewal of life came along in the middle of February, therefore the love lottery was held, coupling young men and women for one year, often leading to marriage.

Valentine’s Day is celebrated in the USA, Canada, Mexico, France, Australia and the United Kingdom.

The oldest known Valentine’s card can be viewed in the British museum.

Valentine’s day became an official Catholic Holiday in the year 496 or 498 AD. Pope Gelasius declared the 14 February to be Saint Valentine’s Day.

The oldest known and remembered Valentine’s poem is from Charles, Duke of Orleans to his wife, in 1415, while he was imprisoned in the Tower of London. It is part of a manuscript collection of the British Library in London.

Years later King Henry V is supposed to have hired the writer John Lydgate to compose a Valentine’s letter to Catherine of Kalois.

In Great Britain it was around the 17th century that Valentine’s Day became a celebrated Holiday. By the middle of the 18th century it was common for all social classes to exchange small gifts or handwritten notes with lovers, loved ones and friends.

By the end of the 18th century printed Valentine’s cards were available.

In the United States people started celebrating Valentine’s Day in the early 1700’s by exchanging Valentine’s notes.

The Greeting Card Association announced that Valentine’s Day is the second best selling card-sending day with one billion cards sold per year. The leader in the card industry is with 2.6 billion, Christmas.

In the year 1835 Pope Gregory XVI was so impressed by the Irish Priest Father John Spratt that he gave him the black and golden casket, which is believed to house the remains of Saint Valentine. This gift from Rome, the black and golden casket, can actually be viewed on Valentine’s Day every year at Whitefriar Street Church in Dublin, Ireland.

We hope that you did enjoy this little background on Valentine’s Day and we wish you a very happy Valentine’s Day, with lots of lasting love and Friendship!

Task Manager Disabled


once i found that my computer come in a situation of deadlock . so like a every person i go for for
task manager to end the process and i found my task manager disabled.I do not know what happen either it may be due to some kind of virus or any other thing so after searching i found a solution
how to enable your task-manager again.

Some of the simpler viruses cause small discomforts like disabling your task manager and things like that. One of the reason that the virus disables your task manager is so that it is harder for you (the user) to do anything about the infection.

Well if you have been infected already, I would suggest that you first go online and do a online virus scan. from either Comodo, Kaspersky or other such reliable companies. Once you are done with that and are sure that there is no virus in your system then we can work on getting your task manager back!

First of go to Run and type gpedit.msc and hit Enter.

Once you are in the Group Policy Editor, on the left hand panel navigate to the following:

User Configuration –> Administrative Templates –> System –> Ctrl+Alt+Del Options

You will see this on you screen:

gpeditcadoptions

Double click on Remove Task Manager to change its property and disable it.

Another way of enabling your task manager once again is from the Registry. And because I have already added quite a few Registry hacks on this site, this should be a nice addition to our collection

First go to Run and type regedit and hit enter

once in the registry editor, use the left hand panel to navigate to the following:

HKEY_CURRENT_USER –> Software –> Microsoft Windows –> CurrentVersion –> Policies –> System

regedit

You will see an item named DisableTaskMgr. Right click on it and select Delete.

That should work out!

hope this was useful!

cheers

if you found any problem plz contact us and also post comment

How to Make a Good Password


Creating a Strong Password

Before we begin, you must be clear on one big truth: there is no such thing as a perfect password. A committed hacker can crack any password, given enough time and the right "dictionary" or "brute force" tools. But just like breaking into a car, if the protection is strong enough, the hacker will become discouraged and give up before the protection fails.

How Hackers Crack Passwords

Hackers use one of two major techniques: password recovery (an administrator's technique), and "brute force" repetition. The password recovery tries to fool your computer system into trusting the hacker as a legitimate administrator. Brute force is simply repetitve attempts at your password, up to hundreds of attempts per minute, to crack it.

"Brute Force" Repetition

Hackers often use software tools called "brute force dictionaries"...software that quickly recombines English dictionary words with thousands of varying combinations of spellings. (Yes, much like a Hollywood safecracker movie scene, but slower and less glamorous.)
Brute force dictionaries always start with simple letters "a", "aa", "aaa", and then eventually moves to full words like "dog", "doggie", "doggy". These brute force dictionaries can make up to 50 attempts per minute in some cases. Given several hours or days, these dictionary tools will overcome any password. The secret is to make it take days for your password!


The Password Challenge: "How Can I Make It Tough to Crack, But Easy to Remember?"


Indeed, how does one balance these two contrary objectives? A long password of cryptic characters will be strong, but so frustrating to remember. Yet a short-and-easy password will get cracked within minutes by a good hacker.

Gratefully, there are some helpful tips to create a strong-yet-memorizable password. The idea behind these next five password suggestions is to turn an easy-to-remember phrase into a cryptic word that will discourage hackers.

6 Tips to a Strong Password

1) Make your password long – 6 characters is OK, 10 characters is good, and 15 characters is excellent. 15 is really desirable for high-level security, because 15 is a special number in Microsoft Windows. At 14 characters and less, Windows passwords are scrambled as “hashes” (encrypted into unseen scrambled characters), and stored in hidden Windows system files. It is possible for a gifted hacker to access those stored hashes and unscramble your passwords. However, MS Windows no longer stores hashed passwords at 15 characters and longer. Yes, it is annoying to type 15 characters just to log into your account, but some situations may merit the effort. For example: you are the chief financial officer of a company, or you are the master sergeant for a military unit

2) Start designing the password with a memorable meaningful phrase..then make it complex by adding numbers and special characters. Here is how you do it:

1. Pick a word or multi-word phrase that is meaningful to you.

2. Mix one or two letters to be upper case.

3. Then change one or two letters to be numbers.

4. Then for the sneaky twist: insert one or two non-alphabetic characters. The beginning or end of the password is easiest for memorization purposes. Examples include: .(period), !,*, %, &, or #.

5. 3) Change your password every 4 weeks. Many employers serious about protecting their data will require their employees to change their password on a regular basis, once a month at minimum. It is a good practice to do the same on your home computer where you keep private financial information.

4) Do not store your password on paper or with storage software Please avoid password-keeper programs that claim to make your life easier. It is the opinion of this writer that password products do not offer enough protection for your login information should your computer get hacked. It is better to memorize a password whenever possible. Never keep your passwords on a piece of paper under the keyboard or in your wallet. Do not keep them in your PDA either; if you must store your passwords at all, keep the passwords’ hints instead. For example, as an alternative to storing “Dexter2Gouda” use “puppy’s name, age and favorite snack”.

5) Use different passwords for your different computer accounts. As annoying as it is to remember them all, please do create a different password for your email, for your online banking, for your eBay and your PayPal. Should one of your passwords ever be compromised, at least the hacker will not be taking over all of your accounts.
6. Advanced Tips for Designing Strong Passwords:



o If you frequently login to various websites and keep re-using the same password for all of them, check out Nic Wolff’s clever password generator utility



o The idea behind Nic Wolff's utility is to have one “master password” to secure all your other passwords, no matter how many of them you have!
o Although the mathematical encryption is complex, the Master Password itself is easy to use. The whole Wolff Master Password process is explained in a short movie tutorial created by InfoWorld’s Jon Udell here:


# http://weblog.infoworld.com/udell/gems/singleSignOn.html

# Another useful password generator is here: http://motdepasse.site.voila.fr/index.html
# Lastly, Johnston’s neatly updated version of the same password generator can be found here: http://www.hashapass.com/
These utilities are free and none of the passwords you generate with these scripts is transmitted or stored anywhere.

6) use spaces one of the working method found by me is to use spaces at the last of your password. you can set any number of password behind your password it depend upon u.this is going to protect your account from phishing etc
Good luck with keeping your private information private! We can never completely stop hackers or car thieves, but we can certainly make these scoundrels work for it if they want to hack our accounts.

Friday, February 12, 2010

Speed up Intenet Surfing :Windows Xp

By default, most systems have some bandwidth reserved for nothing. You can change this the following way: (Note: this only works in Windows XP Professional)






By default, most systems have some bandwidth reserved for nothing. You can change



* Open gpedit.msc from the run box in the start menu.
* Navigate to: Local Computer Policy > Computer configuration > Administrative templates > Network > QoS Packet Scheduler
* Open Limit Reservable Bandwidth
* Check the enabled box and change the Bandwidth Limit to 0%.

Depending on your system, this might need a restart to start working.

Happy Surfing !!

Thursday, February 11, 2010

Split & cut MP3 music files online

We can easily cut selected part of mp3 song and use the smaller part as a ringtone. We have already seen easy to use free MP3 cutter software to cut any mp3 song file. Now you can edit and cut mp3 files online without having to install any software on the computer using ‘mp3cut.net’ online tool.



Edit & Cut MP3 songs online

1. Open Mp3Cut online tool website.

2. Click Upload MP3 button & select MP3 file on the computer. Depending on the size of selected MP3 file, it will take some time to upload and verify the file.

















3. Then select the start-end mp3 song position using slider.
4. Click Split and download button to save cut mp3 song on computer.

Wednesday, February 10, 2010

Google Goes Social with Google Buzz




It’s official: GoogleGoogle has just announced Google Buzz, its newest push into the social media foray. This confirms earlier reports of Gmail integrating a social status feature.
On stage revealing the new product was Bradley Horowitz, Google’s vice president for product management. While introducing the product, Mr. Horowitz focused on the human penchant for sharing experiences and the social media phenomenon of wanting to share it in real time. These two key themes were core philosophies behind Google Buzz.
“It’s becoming harder and harder to find signal in the noise,” Bradley stated before introducing the product manager for Google Buzz, Todd Jackson.
Here are the details:

Google Buzz: The Details


















- Mr. Jackson introduced “a new way to communicate within Gmail.” It’s “an entire new world within Gmail.” Then he introduced the five key features that define Google Buzz:
- Key feature #1: Auto-following
- Key feature #2: Rich, fast sharing experience
- Key feature #3: Public and private sharing
- Key feature #4: Inbox integration
- Key feature #5: Just the good stuff
















- Google then began the demo. Once you log into Gmail, you’ll be greeted wiht a splash page introducing Google Buzz.
- There is a tab right under the inbox, labeled “Buzz”
- It provides links to websites, content from around the web. Picasa, Twitter, Flickr and other sites are aggregated.
- It shows thumbnails when linked to photos from sites like Picasa and Flickr. Clicking on an image will blow up the images to almost the entire browser, making them easier to see.
- It uses the same keyboard shortcuts as Gmail. This makes sense. Hitting “R” allows you to comment/reply to a buzz post, for example.
- There are public and private settings for different posts. You can post updates to specific contact groups. This is a lot like Facebook friend lists.
- Google wants to make sure you don’t miss comments, so it has a system to send you an e-mail letting you know about updates. However, the e-mail will actually show you the Buzz you’ve created and all of the comments and images associated with it.
- Comments update in real time.












- @replies are supported, just like Twitter. If you @reply someone, it will send a buzz toward an individual’s inbox.




- Google Buzz has a “recommended” feature that will show buzzes from people you don’t follow if your friends are sharing or commenting on that person’s buzz. You can remove it or change this in settings.
- Google is now speaking about using algorithms to help filter conversations, as well as mobile devices related to Buzz.

The Mobile Aspect


















- Google buzz will be accessible via mobile in three ways: from Google Mobile’s website, from Buzz.Google.com (iPhone and Android), and from Google Mobile Maps.
- Buzz knows wher you are. It will figure out what building you are and ask you if it’s right.
- Buzz has voice recognition and posts it right onto your buzz in real-time. It also geotags your buzz posts.
- Place pages integrate Buzz.
















- In the mobile interface, you can click “nearby” and see what people are saying nearby. NIFTY, if I say so myself.
- You can layer Google Maps with Buzz. You can also associate pictures with buzz within Google Maps.
- Conversation bubbles will appear on your Google Maps. They are geotagged buzz posts, which lets you see what people are saying nearby.







Profile pictures of friends

No setup needed

Automatically follow the people you email and chat with the most in Gmail.
Public and private settings

Share publicly or privately

Publish your ideas to the world or just to your closest friends.
Gmail icon

Inbox integration

Comments get sent right to your inbox so it's easy to keep the conversation going.
Photos of friends

Photo friendly

See thumbnails with each post, and browse full-screen photos from popular sites.
Popular social websites

Connect sites you already use

Import your stuff from Twitter, Picasa, Flickr, and Google Reader.
Alarm clock

See updates in real time

New posts and comments pop in as they happen. No refresh required.
Delicious taco

Just the good stuff

Buzz recommends interesting posts and weeds out ones you're likely to skip.

Much like FriendFeed, Google Buzz lets you import content from sites like Twitter, Flickr or Google Reader. You can follow interesting people, flag the items you like, add comments and get notifications in your inbox.


Google Buzz will be added to your Gmail account in the coming days, but Gmail is just one of the interfaces that will integrate Google Buzz. You can already try Google Buzzon your mobile phone by visiting buzz.google.com if you have an iPhone or an Android phone.


"We focused on making the sharing experience really rich by integrating photos, videos, and links. No more fuzzy little pictures: Buzz makes it easy to quickly flip through photos and experience them the way they were meant to be seen: big and full-resolution. And videos play inline so you can watch them without opening a new window. You can choose to share publicly with the world or privately to a small group of friends each time you post," informs Gmail's blog.
Update. Here's the launch event video:
Update. Here's the launch event video:

Monday, February 8, 2010

Speed up Intenet Surfing :Windows Xp

By default, most systems have some bandwidth reserved for nothing. You can change this the following way: (Note: this only works in Windows XP Professional)

  • Open gpedit.msc from the run box in the start menu.
  • Navigate to: Local Computer Policy > Computer configuration > Administrative templates > Network > QoS Packet Scheduler
  • Open Limit Reservable Bandwidth
  • Check the enabled box and change the Bandwidth Limit to 0%.

Depending on your system, this might need a restart to start working.

Happy Surfing !!