Saturday, February 8, 2014

Super Tic Tac Toe v1 00 Widget Free Game Symbian S60v5 S 3 Anna Belle


Enjoy the classic game of Tic Tac Toe!!
Play Tic Tac Toe with friends or against your mobile to become a Tic Tac Toe master!
This Super Tic Tac Toe game is designed forNokia Mobile.
Beautifully designed interface.
Smooth touch support interface.
Two Player support.


Friday, February 7, 2014

How to insert Border in blogpost

Adding a border to blog post is a common problem for many bloggers, we always want to add some colored border to highlight codes in blog post or to write a notice in blog post. But we often face many problems inserting HTML, JavaScript and CSS codes in blog posts. This tutorial will make it quite easy for you, what you need to do is put two lines of codes in post editor HTML mode and write whatever you want to highlight.

The effect that you will see from this tutorial is

Follow the following steps
1) Go to New post in Blogger
2) Click on HTML editor
3) Then put the following code there as it is
<div style="border: 1px dotted red; padding: 8px;">
Add here the text to be bordered
</div>
4) Now replace "Add here the text to be bordered " with the text you want to be in border 

If you are getting any problem then please ask.

Compress and Resize photo using Microsoft tool

You can compress and re-size photos using Microsoft Picture Manager. It is a built in Microsoft Office tool to edit photographs. Using Microsoft Picture Manager you can also remove the red eye, can adjust color, brightness and crop photographs.
So it is a very handy tool for us to make primary changes to our photographs. In this tutorial I will explain only about  two features which are re-size and compress features. There are four different options for resize an image. You can use predefined sizes or can give your custom size. Compression has also four different options. I will explain these all thoroughly in the following tutorial.

Follow the following steps
Part-I: To Resize
1) Open the Picture in Microsoft Picture Manager as shown in the following image


2) Then select the Edit Pictures option 


3) After that you will have multiple options on your left. Select the Resize option


4) You can see the Original size your image 

5) Now you will have three different options, these are Predefined, Custom and Percentage. Select any of them, if you select the Predefined option then pick one option among Document-Large, Document-small, Web-Large, Web-small, E-mail-Large, E-mail-small from the drop down menu. If you select the Custom size option then give your perred size. If you select the Percentage option give the percentage, note that this will be the percentage of original width and height of the picture.


Part-II: To Compress
1) Follow upto step (2) of part one.
2) Then select the option Compress Pictures instead of Resize

3) Then you will have four option these are Dont compress, Documents, Web images and E-mail messages as shown in the following image. Select any of them and click Ok. Finally Save your picture by going to file.
Thats all about Resizing and Compressing and image using Microsoft Picture Manager. Subscribe Us

Thursday, February 6, 2014

How to link multiple gmail accounts

Many of us have more than one Gmail accounts for many purposes. Sometimes it is quite difficult to check all the accounts due to insufficient time, so why not we merge them out to have all the emails under one shelter.
We can merge multiple Gmail accounts to have easy access to our email. It will be worth for us to add them up. I dont know whether other email provider have this feature or not. But Gmail does have. 


To merge two accounts you need to choose which email address will receive and which will forward the email. In this tutorial we call the one as Primary which will receive email and other will be called Secondary. If any one sends email to the Secondary email it will automatically forwarded to the Primary email address, this enables us to have emails from two accounts under one shelter that is the Primary email ID. Without discussing further lets start learning this.

Follow the following steps
1) Go to your primary Gmail account
2) Under settings tab click on Accounts and Import
3) Click on Add another email address you own

 

4) After clicking, a window will pop up like this


5) Type the secondary email address and Click on Next Step and then click Send Verification
6) Now Sign in to your Secondary email address for verification, click on the request confirmation link.
7) Still in the secondary email account go to Forwarding and POP/IMAP under settings tab.

Buy this product
Discount on Sony Smartwatch flipkart.com
Nicely designed smartwatch with 20 mm Watchband Adapter, Charging with Standard USB...

8) Click on Add a forwarding address


9) Now type your primary email address then clcik on Next and then Proceed

10) Now go to Configure your email client and select a option from the drop-down menus.


11) Click on Save ChangesNicely designed smartwatch with 20 mm Watchband Adapter, Charging with Standard USB...

12) Now you have to confirm the request of secondary email address to automatically forward mail to your primary address. For this Sign in again to your primary email address and click on the request confirmation link.
Thats all about merging two Gmail accounts. Subscribe Us.

GREAT WAYS TO CHANGE YOUR IP ADDRESS WITH FIRE FOX EXTENSION

If you are really looking out for ways to surf websites and blog that restrict your location and IP address, then just make your self comfortable reading the below tutorial and stay anonymous.

You can bet with me that there is no website or blog you can possibliy visit without leaving a trace of your location, computer and browser infomation. Some of these websites place ban on users and visitors from specific location and network,there by making it imposible for you to access them if at all you fall within that location. Some locations also have been flaged due to large number of spam activity that originates from such location. I am sure you already know what I am talking about. It means IP addresses from such locations have been black listed. Most at times IP address from Nigeria and other West african countries are flaged in major websites arround the world.

Any way I just broke the ice and dicovered a better way of bypassing such restriction to enable you access such websites without any software. You can use it to get yourself a paypal, clickbank, and join other social Networking site such as zoosk.com, facebook, twoo.com, badoo and many others. Just follow my simple tutorial and youre done (staying anonymous).

Your first step to an unrestricted Internet access is to download this Fiox Extension that helps you to grab hundreds ( over+300) of web proxies built into Fiox

HOW Important is this Fiox Extension?
Now let me tell you something unique about this "Fiox Extention" or whatever
  1. › You get hundreds of web proxies built into Fiox!
  2. › Choose among hundreds of live proxies (304 proxies live) to manage your web identity:
  3. › Find the fastest connection available by latency
  4. › You can Switch to new proxies right in your web browser if you want and avails you an unparalleled proxied browsing experience for FREE
what you can use the IP addresses for
      › Browse the web anonymously using our shared, public IP addresses
      › Change your location geographically withdiverse servers to choose from
      › Secure your browsing history with a high URL encryption scheme
      › Start fresh with a new IP any time


    STEP 1
    Dowload and Install it,
    Go to your fiox browser menu bar and select Tools to find where to active the Proxy extention.
    I strongly recommend that you sort for proxy list that gat high latency so that the fastest ones such as those shown in green ensures maximum result, experiment with the yellowish ones until you find a nice proxy with a e.g., minimal or no ads and less pop ups that you can use. You can save your favourite proxy with a star for easy access.

    STEP 2


    Quickly Make your like a kid who just found himself in a burger shop with Daddy and select any proxy to browse the hell outta your PC:
    type URLS blog spot.com, click links, open bookmarks like normal. You dont need to freak out, Sure! the extension got you covered and your browsing is proxied. You have the freedom to switch proxies (or turn it off) at any time through the proxy list menu using step 1

    THATs ALL

    Wednesday, February 5, 2014

    How to Import Powerpoint into Keynote without Using iTunes

    If you have PowerPoint slides that you need to convert to Keynote on your iDevices, chances are you would import into Keynote using iTunes, which would involve syncing your iDevices with your computer. There is another way to do this bypassing the synching process.

    You will need a account with some file hosting service like Dropbox or online note taking service like Evernote.

    Simply drop your PowerPoint into Dropbox or Evernote.

    Once inside, click on the drop down menu in the top right hand corner and select the Open in Keynote option

    Select Open in Keynote from drop down menu

    The PowerPoint slide will be converted on-the-fly and opened in Keynote.

    Next generation iPad to sport iPad mini like design and display Reports


    Next-generation iPad to sport iPad mini-like design and display

    Its that time of the year again. As we approach fall, were getting closer to the launch of Apples new products, as promised by CEO Cook during the companys last earnings call. This also means that we can expect new rumours and leaks to start hitting the Internet.

    While a lot is already known about the iPhone 5S (the next-generation iPhone) and the iPhone 5C (the low-cost iPhone), were also seeing new rumours and leaks related to the next-generation iPad and iPad mini.

    A number of rumours have already suggested that Apple is modelling its next-generation iPad on the iPad mini in terms of design and form factor. The speculation has got more credence thanks to a new report by The Wall Street Journal. The report mentions that the new iPad will feature the same touch-panel technology thats seen in the iPad mini, making it thin and light. It cites people with knowledge of the matter as a source, and adds that Apple intends to use the film-based touch panel used in the iPad mini instead of the glass-based one that is sported by the full-sized iPad.

    Recently, a video showing the front and back panel of the fifth-generation iPad assembled together, had appeared online showing a design different from the current generation iPad. Prior to that pictures of alleged back panels of the next-generation iPad and iPad mini had also appeared online. The purported iPad rear casing was slightly smaller than the casing of the current generation iPad and the site mentioned that the distance between the border and screen of the iPad 5 was much shorter than the previous iPads, indicating that the new iPad would look similar to the iPad mini with smaller bezels. The casing had the Apple logo carved out and not just printed on it, in the images.

    While the exact launch dates of the new iPad and iPad mini are not known, yet, a new report by Bloomberg suggests that Apple will release new iPad models, including an iPad with a thinner body design and an iPad mini with a high-resolution screen, later this year but not at the September 10 iPhone event.

    It adds that the "planned new full-size iPad, with a 9.7-inch screen, will have a body that more closely resembles the current iPad mini, with a thinner bezel than the current version. It will be the first redesign since March 2012, when Apple introduced a high-resolution iPad with the current shape."

    A number of rumours suggest that Apple could release the next generation iPad mini in the fourth quarter of 2013 but its not known if it will feature a Retina screen. Just a few days back, a report by Apple-focused website 9to5Mac claimed that Apple was testing a new iPad mini model that would include a faster processor but not a Retina display. However, a few hours later, a new report by The Wall Street Journal appeared suggesting that Apples suppliers were ramping up production of a new iPad mini device that features a high resolution Retina screen made by Samsung.  

    Anupam Saxena

    Tuesday, February 4, 2014

    How to tell the Weather using Gmail

    Here is a fun way to know if the weather is good outside while you are on you Gmail

    Go to Settings > Themes

    Scroll down where you see the Classic Themes gallery and select the Tree theme

    Now when the weather is bad, like at this time of writing, you will see this in the background of your Inbox.

    Gmail with the classic theme - Tree
    Thunder and dark skies showing on the Tree theme

    And when the weather is good, which was what happened a few hours later, you will see this.

    Tree theme in Gmail
    Clear sky finally




    All Mobiles Secret Codes




    Samsung Secret Codes

    Software version: *#9999#
    IMEI number: *#06#
    Serial number: *#0001#
    Battery status- Memory capacity : *#9998*246#
    Debug screen: *#9998*324# - *#8999*324#
    LCD Contrast: *#9998*523#


    LG Secret Codes


    LG all models test mode: Type 2945#*# on the main screen.
    2945*#01*# Secret menu for LG
    IMEI (ALL): *#06#
    IMEI and SW (LG 510): *#07#
    Software version (LG B1200): *8375#
    Recount cheksum (LG B1200): *6861#
    Factory test (B1200): #PWR 668
    Simlock menu (LG B1200): 1945#*5101#
    Simlock menu (LG 510W, 5200): 2945#*5101#
    Simlock menu (LG 7020, 7010): 2945#*70001#


    Motorola Secret Codes

    IMEI number:*#06#
    Code to lock keys. Press together *7
    Note: [] (pause) means the * key held in until box appears.
    Select phone line - (use this to write things below the provider name):
    [] [] [] 0 0 8 [] 1 []
    Add phone book to main menu:
    [] [] [] 1 0 5 [] 1 []


    Nokia Secret Codes

    *#06# for checking the IMEI (International Mobile Equipment Identity).
    *#7780# reset to factory settings.
    *#67705646# This will clear the LCD display(operator logo).
    *#0000# To view software version.
    *#2820# Bluetooth device address.
    *#746025625# Sim clock allowed status.
    *#62209526# - Display the MAC address of the WLAN adapter. This is available only in the newer devices that supports WLAN.

    Monday, February 3, 2014

    How to show Blog title after Blog post title

    Showing blog title after blog post title is the most important Search Engine Optimization trick that most of the bloggers apply to their blogs for making their blog posts search engine friendly.If your blog title appears before blog post title then Google will give perence to your post only when someone search your post giving your blog title at first of the search texts,for which the user should know your blog title at first,which will be difficult or nearly impossible for you.
      By placing the blog title after blog post title,you can make your blog more likable by Search engine,because now those user can find your blog who dont even know your blog title.


    To apply this trick follow the following steps caully
    1) Go to Blogger------Design------Edit HTML
    2) Backup your template
    3) Search for the following codes
    <data:blog.pageTitle/>

    4) Replace it with the following codes

    <data:blog.pageName/> | <data:blog.title/>

    <data:blog.pageTitle/>


    5) Save the Template

    Asus PadFone 2 phone in a tablet released with quad core processor and ICS


    The PadFone 2 is not only bigger and faster, it is, combined, lighter than Apples new iPad, add to that one of the most powerful processors in a smartphone and youre onto a winner.

    Asus has unveiled the new PadFone 2 smartphone and tablet hybrid in Milan today running Ice Cream Sandwich and sporting a larger 4.7-inch HD display and quad-core S4 processor.

    The PadFone 2 has had a bump in the screen department going up to a Galaxy S3 rivaling 4.7-inches whilst swapping the original OLED panel for an integrated Super LCD which means brighter, sharper and as weve seen in the iPhone 5, a lot thinner.

    Under the hood is where things get really impressive however as the PadFone 2 sports Snapdragons new S4 quad-core processor making it one of the most powerful smartphones on the market. Theres 2GB of RAM making sure that no matter what youre doing the PadFone 2 wont even break a sweat.

    The camera has been given a massive boost now offering up 13MP along with Full-HD video recording, theres also NFC for those that like their payments wireless and Asus Cloud offering cloud storage across Asus devices with a hefty 50GB at your disposal.

    Using a Micro-USB/HDMI hybrid connector the PadFone 2 docks with the station making the transition from smartphone to tablet now instantaneous. What you get then is a 10.1-inch 1280x800 IPS display along with a juice boost of 5,000mAh making sure you wont be running out of power anytime soon.

    Coming in 16GB, 32GB and 64GB flavours theres no word on official pricing, but by looking at US pricing expect both smartphone and tablet to be costing roughly iPhone 5 money, which when you think about it, is actually pretty good value. 

    Sunday, February 2, 2014

    How can You Know Where A Shortened URL Leads To Without Clicking

    I am sure you remember the days of using the tinyurl service where you can shorten a long and verbose URL   into a shorter and succint one. In recent times, these URL shortening services are becoming more useful because of the popularity of Twitter and its 140 character limit that it imposes on users.


    Tweet from Seth Godin containing a shortened URL
    Example of a shortened URL used in a Tweet

    If you are wary about where clicking the link may lead you to, you can make use of an online service called Where Does This Link Go?. The service is simple to use. Just copy and paste the URL into the text box and click on Expand.

    Inserting the shortened URL in wheredoesthislinkgo.com
    Copy and pasting the shortened URL and click Expand
    You will see the expanded version of the shortened URL immediately. Now, you can decide if you want to click through. As an exercise, try to identify this link http://bit.ly/16AtJWi, which is the my blog post.

    Shortened URL expanded on wheredoesthislinkgo.com
    After expansion, you can see that the shortened URL is coming from the authors website
    Use this for shortened URL that you find dubious, and it might just save you an unwanted trip to a malicious site or two. If you have found this short post useful, please share it with your network. 

    HOW TO LOCK DOWN AND SECURE YOUR PC WITH PREDATOR

    This post is about an unsual way to use your USB mass storage device as a tool to secure and lock down your computer for restricted access. Here, your USB mass storage serves a the key to unlock and lock down your PC. Once it is inserted into your Pc It automatically unlock your pc and when once removed, it locks down in a couple of micro seconds. Whether you like it or not a good security measure Is something everyone needs to pull by the side when dealing with anything in this life.

    To do this little trick, I will be introducing to you a window application called PREDATOR that helps you to do this. Predator is the window application you need if you are the security conscious type. It prevents others from hacking into your system files when you are not available. Its more convenient than closing your Windows session, if you ever have to and does not require you as an authorize user toretype your window password when you return.


    KNOW HOW IT WORKS

    Now let me come down to how this very little shit works.
    • Like I said earlier Predator helps you to lock down your Pc/laptop when you remove your USB flash (mass storage Device) while your widows session is still running by darkening your window screen and making your PC/laptop key board and mouse to become totally inactive for anyone or any unauthorized user.
    • One wonderful thing about this application is that it also helps as a tracker and keeps activity logs that enables you to know people who made attempt to use your computer.
    • Predator also helps you to set an alarm that keeps away or freak out intruders. Maybe youre are in a public place operating your Device and at the same time you have a "here and there" movement to do within that area, instead of getting so worried about who to look after or watch out for you PC, just relax and and keep your ears alert to hear an alarm when someone touches it and thats all.
    • Predator also disables ALT+CTRL+DEL on your system, this make it very hard and rigorous for for anyone who is up for a fast one to terminate and kill program process through TASK MANAGER in which predators will certainly happen to be among them.
    • Now come to think of if what if your USB mass storage gets missing... Yes it may happen but then you can still access your Pc with a special Password that you must Have created at the time of installing predator on your system. All that I am going to explain later On in this Post

    System Requirements for Installing predator

    PREDATOR is availble on the following operating systems:
    32-bit based systems
    Windows 8 (all editions)
    Windows 7 (all editions)
    Windows Vista (all editions)
    Windows Server 2008
    Windows Server 2003
    Windows XP SP3 (all editions)
    64-bit based systems
    Windows 8 (all editions) 64-bit
    Windows 7 (all editions) 64-bit
    Windows Vista (all editions) 64-bit
    Windows Server 2008 x64
    Windows Server 2003 x64

    PREDATOR will not work with other versions of Windows than those indicated. If the Microsoft .NET Framework 4 Client Profile is not installed on your computer, the PREDATOR installation program will do it for you.



    Download Predator forWIN 32Bit and WIN64bit

    HOw To Install Predator

    1. Download Predator free edition InstallPredator.exe and Install it in your PC.After installing run the application from Windows program menu or the desktop shortcut icon.
    2. You will get a message box like this Insert your USB flash drive and click OK to continue.
    3. Now the perence window will appear. Here you can set the screen darkness,start-up mode,and other options by checking in the check boxes.
    4. In the Change Password field put your new password when you are configuring 1st time. Select the Drive letter in your computer which indicates the USB drive of your computer. Now press “Create Key” button and it will successfully create the key file in your USB flash drive.
    5. Now click OK.
    6. Check in the system tray.If the Predator icon is blinking then everything you have done is OK an ready to lock your PC.

    STARTING OFF WITH PREDATOR

    To get started with this trick to lock down your PC for security purpose, all you have to do is adhere to all the steps Given below

    To start monitoring your PC
    Insert your key Run the software via the Start Menu / Programs / Predator item or via the PREDATOR icon on the Desktop Make sure that the PREDATOR icon flashes in the taskbar


    When you go away
    Look at the PREDATOR icon in the taskbar: if it is red, wait. If it is green and blinking, remove the key.
    The desktop will be locked in a few moments, depending on the settings you have chosen. If somebody tries to use your PC, PREDATOR shows the password dialog and starts a countdown.
    If an invalid password is entered, PREDATOR sounds an audible alarm and displays a blinking Access Denied sign.

    When youre back
    Insert the key. The desktop will be unlocked in less than a second. If somebody has tried to use your PC, PREDATOR automatically opens the Log window and shows the failed access attempts

    To stop monitoring your PC, temporarily or permanently
    Click on "Pause monitoring" or "Exit" from the context menu

    To verify or tell if someone tried to used your PC while you were away,
    Click on "View log" in the context menu and see all logged activities.


    FAQ:


    Can I make a copy of my USB drive and give it to someone else to use on my PC ?
    No, you cant make a simple copy because PREDATOR has a unique copy-protection scheme: if someone tries to copy a PREDATOR key, the copied key will be useless. If you need several flash drives to protect your computer, you must prepare them with the "Flash Drive" section of the Perences window. For instance you can make a spare key to unlock your computer in case you lose your main key, or you can give their own keys to some trusted persons to allow them to use your PC. Return to FAQs main index

    What is the minimum size of the USB drive needed to operate PREDATOR ?
    Any USB drive size will just be okay do so long as PREDATOR finds a 1KB free space to writes its protection codes and can be found on the USB Drive as "predator.ctl" and is located at the root of the drive.
    What if I lose/break my key ?
    This may be very risky. Its like locking your room and swallowing the Key Up(.....wondering where u r going to lay ur head to rest for that day). Now if this ever happens, then Run Predator, and wait for the screen to go blank, click anywhere on the screen with the left mouse button, then press the Enter key 3 times to display the password dialog box
    Kindly type your password as required to enable you have access once again
    Insert a new flash drive (mass storage Device)
    Right-click the PREDATOR icon found on the taskbar and click the Perences item Prepare your key as shown in the paragraph USB Flash Drive in the Settings page. And thats all.
    What if I forget my password?
    Run PREDATOR as Administrator and click the "Reset Password" button, to reset your password,
    After that kindly Click the close button to quit the program

    You can click here for more Info about Predator Here!

    Saturday, February 1, 2014

    Disable Windows Messenger on a Windows XP


    Note: This tip applies only to Windows XP Professional.
    If youre using MSN Messenger as your chat and videoconferencing tool, you may never use Windows Messenger anymore and have removed it from the startup group to keep it out of your way. However, you may have seen it pop up on occasion and had to struggle with closing it down. The reason that Windows Messenger makes these impromptu appearances is that Outlook, Outlook Express, and even some Microsoft Web pages can still make it load automatically. Fortunately, you can banish Windows Messenger from your desktop by making an alteration to the local group policy with the Group Policy Editor. Heres how:
    1.  Access the Run dialog box by pressing [Windows] + R.
    2.  In the Open text box type Gpedit.msc and click OK to launch the Group Policy Editor.
    3.  Go to Computer Configuration | Administrative Templates | Windows Components | Windows Messenger.
    4.  Double-click the Do Not Allow Windows Messenger To Be Run setting.
    5.  In the resulting dialog box, select the Enabled option and click OK.
    6.  Close the Group Policy Editor. 

    Odesk Earn up to 200 per month

    Odesk is a freelance jobs online. You only need a skill and a computer with internet connection. It is very simple to earn from odesk. First is to register an account, build a good profile, create a good cover letter and save your past works on portfolio.

    Another good thing in odesk is that you can have multiple work if youre hard working. You can earn more than 200$ depends on your skill. Whenever you want to cash out your earnings, just click on widraw then select your perred bank account.