/

Computer Tricks


How to: Recover MOST of scratched CD data disksHow to: Recover MOST of scratched CD data disks

How to recover MOST of scratched CD data discs I,today, learn an old technique to how to recover a damaged or scratched cd disks with very minute loss of data. In this case i have a game  with a chunck of 4 mb lost with a scratch in CD1 Install. Here we cover some special techniques of how to create a full working CD from the scratched one. First some tools will be needed: 1. Alcohol 120% 2. [...]
How to make your system work faster– Increase Virtual Ram

How to make your system work faster– Increase Virtual Ram

If you want to use your system at much faster speed, you can now do it by increasing its virtual memory. With this trick, you can enhance your system’s speed and can use it at much faster speed. I , at Devilslab, am going to tell you the trick. Here are the steps!! Hold down the ‘Windows‘ Key and Press the ‘Pause/Break’ button at the top right of your keyboard. Another [...]
Where The Passwords Get stored in Windows Xp and Vista – Must for hackers and beginners- PART 1

Where The Passwords Get stored in Windows Xp and Vista – Must for hackers and beginners- PART 1

Here is the simple trick through which you can access saved passwords. HOW TO ACCESS REGISTRY ?? Goto Start Menu. Click on Run. Type “regedit” (without quotes) in the Run Box .After that this Windows Opens . Now you are ready to see that. LOCATIONS OF SAVED PASSWORDS ! FOR INTERNET EXPLORER 4.00 – 6.00 The passwords are stored in a secret location in the Registry known as [...]
Why is XP Logon window not coming ?

Why is XP Logon window not coming ?

Sometimes it happens that your Windows XP login screen doesn’t come and the system boot’s but doesn’t enter the desktop. There might be some cases when the Windows XP login screen doesn’t come and the system boot’s but doesn’t enter the desktop. What’s the fault ? The possible reason is a corrupt kernel32.dll. How to fix this error? Boot with the XP [...]
Publish your wordpress, blogger, liveJournal, TypePad Posts from your desktop | A Must have Desktop Blog editor

Publish your wordpress, blogger, liveJournal, TypePad Posts from your desktop | A Must have Desktop Blog editor

I am really very excited to tell you guys about this desktop blog editor. This is my first post that i am publishing with this handy tool. Don’t you know what i am talking about ? Yeah! you got it right.. I am talking about Windows Live Writer Writer makes it easy to share your photos and videos on almost any blog service—Windows Live, WordPress, Blogger, LiveJournal, TypePad, and many [...]
How to remove viruses from pendrives or USB drives ?

How to remove viruses from pendrives or USB drives ?

I have seen many people using pendrives or USB drives, suffering from viruses in their pendrives. One of the most poplular is AUTORUN.INF. What is autorun.inf ? AUTORUN.INF Viruses are virus that uses the Autorun feature of Windows to spread itself on computers. This virus makes a copy of the autorun.inf file to the root or main directory of all the drives on your PC, internal and / or external [...]
Remove autorun.inf virus with USB Disk Security

Remove autorun.inf virus with USB Disk Security

I heard many people saying that his/her comuter/laptops is infected with pendrive viruses i.e. usually AUTORUN.INF I have a solution for this. You can use USB DISK SECURITY for this purpose. What is USB Disk Security? USB Disk Security provides 100% protection against any threats via USB drive, however, the majority of other products are unable even to guarantee 90% protection. USB Disk Security [...]
How to make your browser faster or How to Clear Cache/cookies ?

How to make your browser faster or How to Clear Cache/cookies ?

Well, many of the internet users will be thinking to optimise their browsers to attain the maximum speed. This is really a major problem these days.:( When I got the internet @ my home, i remained busy with softwares which increases internet speed such as speed booster and etc etc but all failed. The conclusion is that there is no software that can increase your internet speed, it is your service [...]
Dell Studio 14 Features WoW…It Rocks !

Dell Studio 14 Features WoW…It Rocks !

Switching off Log4j logging using JAVA

Sometimes we need to switch off logging done by Log4j API. In most of the cases console logging is given by default for external APIs using Log4j.We can turn it off through simple Java code.Following is the explanation.


SFTP without host key verification using J2SSH


In this post connection using J2SSH library and by pass host key verification.When client connects to server using SFTP, server provides public key to the client for verification.


 While connecting to a unknown host, it asks for key verification.Once,    we allow it key exchange takes place and user authentication can be done                                      after that.
















Packaging dependent libraries in Jar file

Sometimes developers release Java based applications as distributional Java Archive or JAR files.Most of the time, my applications are JAR files only.The major concern lies with dependent external library files.The final released JAR file look ugly, accompanied by a directory containing external libraries.It will be total mess when user will some how miss one library file.In one go it can be a nightmare for programmer when the user will go insane because of this.Q. So, what's the solution ?
Ans. Good news !! There are multiple methods to package dependent libraries into the final JAR file.



Shell script to validate shell type

korn bash shell


Sometimes its required to check the shell type to dynamically carry out some operation in unix environement.Here is a small shell script I wrote to check shell type.Currently the script only checks for Korn and bash shell type.
Script can be modified according to need.This script is validated on AIX,RHEL,OEL and HP-UX

How to persist OAuth access token for twitter application

Twitter has become become the information hub in the world wide web.Popularity of Twitter is because of its simple user interface with abounding features and galore of APIs.Any developer will agree, Twitter has most varied, efficient and well documented APIs in comparison to other giants of web.This is the reason, there are so many Twitter applications floating around the internet.In this post we'll check out OAuth work flow and persisting access token fetched from a particular Twiiter account for future use.For this tutorial we'll using Twitter4j API which has OAuth support and its independent of any other jar.At the end I'll share the desktop application created for twitter.

Dominating SERP with Long tail Keywords
Previously I discussed about Google sandbox algorithm and search engine ranking with a heads up for long tail keywords.In this post we'll get real dirty with these type of keywords.So, what exactly is a long tail keyword ?? These are key phrases used by folks out there after narrowing down search query.In other words they the straight forward MONEY MAKERS !! We got to hit the bull's eye to make this work and play smart.Because, the Internet is really wild with so much of nasty competition.

Access and Manipulate Elements of XML file Using Jdom

It has been long time since I updated my blog, challenging the very definition of blog.Anyway lately I've been doing some XML parsing for a new project using Java.I used the default "document Object Model" and it gave me tough time.Reading elements was not not tough , but manipulating and generating new xml file was somewhat difficult.Then came jdom to my rescue after using the Big G (Google).So, now it's time to share something I gained from open source community.Jdom is simply "document object model" based on java for representing XML documents which is an alternative to DOM and SAX.Jdom uses JAXP parser by default rather than crimson or any other parser.But, it can work with nearly every other parser and integrate very well with DOM and SAX.

Dominating SERP with Long tail Keyword

Previously I discussed about Google sandbox algorithm and search engine ranking with a heads up for long tail keywords.In this post we'll get real dirty with these type of keywords.So, what exactly is a long tail keyword ?? These are key phrases used by folks out there after narrowing down search query.In other words they the straight forward MONEY MAKERS !! We got to hit the bull's eye to make this work and play smart.Because, the Internet is really wild with so much of nasty competition.

Access and Manipulate Elements of XML file Using Jdom

It has been long time since I updated my blog, challenging the very definition of blog.Anyway lately I've been doing some XML parsing for a new project using Java.I used the default "document Object Model" and it gave me tough time.Reading elements was not not tough , but manipulating and generating new xml file was somewhat difficult.Then came jdom to my rescue after using the Big G (Google).So, now it's time to share something I gained from open source community.Jdom is simply "document object model" based on java for representing XML documents which is an alternative to DOM and SAX.Jdom uses JAXP parser by default rather than crimson or any other parser.But, it can work with nearly every other parser and integrate very well with DOM and SAX.

KeyWord Research Using Google Adwords

The most important and basic factor in assessing potential of online product's niche market is keyword research for some unique terms, phrases. This means the affiliate marketer or the vendor himself has to compile a set of common phrases or search terms that are commonly used by people to locate products available in the targeted niche.
Let's take a simple scenario in which a user is trying to find remedy of headache. So, the common search query can be something like this "headache home remedies" or "how to stop headache quickly" .Moral of the story is the marketer has to ponder from the view point of the potential customer.

Top Five Tips to Secure Website

website security
A secure website is always essential ingredient of peace of mind for both web-master and the end user.These days hundreds of website come alive on the Internet because of high competition and >web hosting that comes with cheap price tag.But, what people do not understand is value of hack-proof website.Recently, according to a survey conducted by PricewaterhouseCoopers in the year 2009, companies are reducing their security related costs primarily due to recession.But, the number no. of victims is growing without any hurdle.This clearly indicates immense need for security.This post describes few most basic yet powerful ways to curb any hazard to your websites. 
Sure, it isn’t exactly as exciting as the teased ‘Adamo‘ laptop, but Dell’s Studio 14 laptop is still worth a look. Revealed, oddly enough, on Dell’s Malaysian site, the system sits, oddly enough, between the 15.4in Studio 15 and forthcoming 13.3in Studio XPS 13. Dell Studio 14 is a 14.1-inch widescreen laptop with rich multimedia features.Available in 7 colors.

Hide

RSS Feed

0 Comments for Computer Tricks

Leave a comment!

Find it!

Theme Design by devolux.org. Converted by Wordpress To Blogger for WP Blogger Themes. Sponsored by iBlogtoBlog

Followers