Wednesday, August 27, 2014

Why we are care Broadband Speed


Our broadband speed and our broadband experience is something we really need to think about when deciding on a new package .The speed of a broadband package is sometime which an increasing number of people are finding is becoming a priority of theirs.
Here are the reasons why we are care about their broadband speed, and what we should take into consideration:
  • It affects your download speed If we are a large user of download sites  in case you tend to stream videos or music (on YouTube, for example) then your download speed will be important to you. Most individuals who use sites like YouTube detest waiting for videos to buffer, so by increasing your broadband speed you will see large improvements on issues like this.
  • If you have a large relatives In case you have a large relatives or lots of people in the house, then having a broadband package with fast speeds will help. It can be had when there is a houseful of people all using the net without delay, because it can often slow down speeds and reactivity. A faster broadband stops this from being an issue, so it does not matter how lots of theres of you surfing the net.
  • Quicker access and loading times In case you start your computer and it takes0 or fifteen minutes for your net to even connect, you are actually wasting your own time. By increasing your broadband speed you save yourself the work of waiting around for pages to load or for images to load. It gives you faster and better access to knowledge so in case you require to check something quickly before leaving the house, you can.


There is more to think about though when choosing broadband speeds. In the event you can afford it, looking in to fibre optic broadband is a great idea, it is new know-how & claims to beat the speed of ordinary broadband hands down. In the event you can nott afford to alter to fibre optic then contact your provider & ask about what packages they can offer you.
Keep in mind other things to, like the amount of downloadable date you will need per month & whether you need parental control . Overall, the important thing is to keep in mind not to rush in to purchasing your broadband package.
Contact different companies & ask about what different offers & deals, describe to them that you need to prioritise speed & hopefully they can discover a package that suits you perfectly.

Saturday, February 8, 2014

Super Tic Tac Toe v1 00 Widget Free Game Symbian S60v5 S 3 Anna Belle


Enjoy the classic game of Tic Tac Toe!!
Play Tic Tac Toe with friends or against your mobile to become a Tic Tac Toe master!
This Super Tic Tac Toe game is designed forNokia Mobile.
Beautifully designed interface.
Smooth touch support interface.
Two Player support.


Friday, February 7, 2014

How to insert Border in blogpost

Adding a border to blog post is a common problem for many bloggers, we always want to add some colored border to highlight codes in blog post or to write a notice in blog post. But we often face many problems inserting HTML, JavaScript and CSS codes in blog posts. This tutorial will make it quite easy for you, what you need to do is put two lines of codes in post editor HTML mode and write whatever you want to highlight.

The effect that you will see from this tutorial is

Follow the following steps
1) Go to New post in Blogger
2) Click on HTML editor
3) Then put the following code there as it is
<div style="border: 1px dotted red; padding: 8px;">
Add here the text to be bordered
</div>
4) Now replace "Add here the text to be bordered " with the text you want to be in border 

If you are getting any problem then please ask.

Compress and Resize photo using Microsoft tool

You can compress and re-size photos using Microsoft Picture Manager. It is a built in Microsoft Office tool to edit photographs. Using Microsoft Picture Manager you can also remove the red eye, can adjust color, brightness and crop photographs.
So it is a very handy tool for us to make primary changes to our photographs. In this tutorial I will explain only about  two features which are re-size and compress features. There are four different options for resize an image. You can use predefined sizes or can give your custom size. Compression has also four different options. I will explain these all thoroughly in the following tutorial.

Follow the following steps
Part-I: To Resize
1) Open the Picture in Microsoft Picture Manager as shown in the following image


2) Then select the Edit Pictures option 


3) After that you will have multiple options on your left. Select the Resize option


4) You can see the Original size your image 

5) Now you will have three different options, these are Predefined, Custom and Percentage. Select any of them, if you select the Predefined option then pick one option among Document-Large, Document-small, Web-Large, Web-small, E-mail-Large, E-mail-small from the drop down menu. If you select the Custom size option then give your perred size. If you select the Percentage option give the percentage, note that this will be the percentage of original width and height of the picture.


Part-II: To Compress
1) Follow upto step (2) of part one.
2) Then select the option Compress Pictures instead of Resize

3) Then you will have four option these are Dont compress, Documents, Web images and E-mail messages as shown in the following image. Select any of them and click Ok. Finally Save your picture by going to file.
Thats all about Resizing and Compressing and image using Microsoft Picture Manager. Subscribe Us

Thursday, February 6, 2014

How to link multiple gmail accounts

Many of us have more than one Gmail accounts for many purposes. Sometimes it is quite difficult to check all the accounts due to insufficient time, so why not we merge them out to have all the emails under one shelter.
We can merge multiple Gmail accounts to have easy access to our email. It will be worth for us to add them up. I dont know whether other email provider have this feature or not. But Gmail does have. 


To merge two accounts you need to choose which email address will receive and which will forward the email. In this tutorial we call the one as Primary which will receive email and other will be called Secondary. If any one sends email to the Secondary email it will automatically forwarded to the Primary email address, this enables us to have emails from two accounts under one shelter that is the Primary email ID. Without discussing further lets start learning this.

Follow the following steps
1) Go to your primary Gmail account
2) Under settings tab click on Accounts and Import
3) Click on Add another email address you own

 

4) After clicking, a window will pop up like this


5) Type the secondary email address and Click on Next Step and then click Send Verification
6) Now Sign in to your Secondary email address for verification, click on the request confirmation link.
7) Still in the secondary email account go to Forwarding and POP/IMAP under settings tab.

Buy this product
Discount on Sony Smartwatch flipkart.com
Nicely designed smartwatch with 20 mm Watchband Adapter, Charging with Standard USB...

8) Click on Add a forwarding address


9) Now type your primary email address then clcik on Next and then Proceed

10) Now go to Configure your email client and select a option from the drop-down menus.


11) Click on Save ChangesNicely designed smartwatch with 20 mm Watchband Adapter, Charging with Standard USB...

12) Now you have to confirm the request of secondary email address to automatically forward mail to your primary address. For this Sign in again to your primary email address and click on the request confirmation link.
Thats all about merging two Gmail accounts. Subscribe Us.

GREAT WAYS TO CHANGE YOUR IP ADDRESS WITH FIRE FOX EXTENSION

If you are really looking out for ways to surf websites and blog that restrict your location and IP address, then just make your self comfortable reading the below tutorial and stay anonymous.

You can bet with me that there is no website or blog you can possibliy visit without leaving a trace of your location, computer and browser infomation. Some of these websites place ban on users and visitors from specific location and network,there by making it imposible for you to access them if at all you fall within that location. Some locations also have been flaged due to large number of spam activity that originates from such location. I am sure you already know what I am talking about. It means IP addresses from such locations have been black listed. Most at times IP address from Nigeria and other West african countries are flaged in major websites arround the world.

Any way I just broke the ice and dicovered a better way of bypassing such restriction to enable you access such websites without any software. You can use it to get yourself a paypal, clickbank, and join other social Networking site such as zoosk.com, facebook, twoo.com, badoo and many others. Just follow my simple tutorial and youre done (staying anonymous).

Your first step to an unrestricted Internet access is to download this Fiox Extension that helps you to grab hundreds ( over+300) of web proxies built into Fiox

HOW Important is this Fiox Extension?
Now let me tell you something unique about this "Fiox Extention" or whatever
  1. › You get hundreds of web proxies built into Fiox!
  2. › Choose among hundreds of live proxies (304 proxies live) to manage your web identity:
  3. › Find the fastest connection available by latency
  4. › You can Switch to new proxies right in your web browser if you want and avails you an unparalleled proxied browsing experience for FREE
what you can use the IP addresses for
      › Browse the web anonymously using our shared, public IP addresses
      › Change your location geographically withdiverse servers to choose from
      › Secure your browsing history with a high URL encryption scheme
      › Start fresh with a new IP any time


    STEP 1
    Dowload and Install it,
    Go to your fiox browser menu bar and select Tools to find where to active the Proxy extention.
    I strongly recommend that you sort for proxy list that gat high latency so that the fastest ones such as those shown in green ensures maximum result, experiment with the yellowish ones until you find a nice proxy with a e.g., minimal or no ads and less pop ups that you can use. You can save your favourite proxy with a star for easy access.

    STEP 2


    Quickly Make your like a kid who just found himself in a burger shop with Daddy and select any proxy to browse the hell outta your PC:
    type URLS blog spot.com, click links, open bookmarks like normal. You dont need to freak out, Sure! the extension got you covered and your browsing is proxied. You have the freedom to switch proxies (or turn it off) at any time through the proxy list menu using step 1

    THATs ALL

    Wednesday, February 5, 2014

    How to Import Powerpoint into Keynote without Using iTunes

    If you have PowerPoint slides that you need to convert to Keynote on your iDevices, chances are you would import into Keynote using iTunes, which would involve syncing your iDevices with your computer. There is another way to do this bypassing the synching process.

    You will need a account with some file hosting service like Dropbox or online note taking service like Evernote.

    Simply drop your PowerPoint into Dropbox or Evernote.

    Once inside, click on the drop down menu in the top right hand corner and select the Open in Keynote option

    Select Open in Keynote from drop down menu

    The PowerPoint slide will be converted on-the-fly and opened in Keynote.

    Next generation iPad to sport iPad mini like design and display Reports


    Next-generation iPad to sport iPad mini-like design and display

    Its that time of the year again. As we approach fall, were getting closer to the launch of Apples new products, as promised by CEO Cook during the companys last earnings call. This also means that we can expect new rumours and leaks to start hitting the Internet.

    While a lot is already known about the iPhone 5S (the next-generation iPhone) and the iPhone 5C (the low-cost iPhone), were also seeing new rumours and leaks related to the next-generation iPad and iPad mini.

    A number of rumours have already suggested that Apple is modelling its next-generation iPad on the iPad mini in terms of design and form factor. The speculation has got more credence thanks to a new report by The Wall Street Journal. The report mentions that the new iPad will feature the same touch-panel technology thats seen in the iPad mini, making it thin and light. It cites people with knowledge of the matter as a source, and adds that Apple intends to use the film-based touch panel used in the iPad mini instead of the glass-based one that is sported by the full-sized iPad.

    Recently, a video showing the front and back panel of the fifth-generation iPad assembled together, had appeared online showing a design different from the current generation iPad. Prior to that pictures of alleged back panels of the next-generation iPad and iPad mini had also appeared online. The purported iPad rear casing was slightly smaller than the casing of the current generation iPad and the site mentioned that the distance between the border and screen of the iPad 5 was much shorter than the previous iPads, indicating that the new iPad would look similar to the iPad mini with smaller bezels. The casing had the Apple logo carved out and not just printed on it, in the images.

    While the exact launch dates of the new iPad and iPad mini are not known, yet, a new report by Bloomberg suggests that Apple will release new iPad models, including an iPad with a thinner body design and an iPad mini with a high-resolution screen, later this year but not at the September 10 iPhone event.

    It adds that the "planned new full-size iPad, with a 9.7-inch screen, will have a body that more closely resembles the current iPad mini, with a thinner bezel than the current version. It will be the first redesign since March 2012, when Apple introduced a high-resolution iPad with the current shape."

    A number of rumours suggest that Apple could release the next generation iPad mini in the fourth quarter of 2013 but its not known if it will feature a Retina screen. Just a few days back, a report by Apple-focused website 9to5Mac claimed that Apple was testing a new iPad mini model that would include a faster processor but not a Retina display. However, a few hours later, a new report by The Wall Street Journal appeared suggesting that Apples suppliers were ramping up production of a new iPad mini device that features a high resolution Retina screen made by Samsung.  

    Anupam Saxena

    Tuesday, February 4, 2014

    How to tell the Weather using Gmail

    Here is a fun way to know if the weather is good outside while you are on you Gmail

    Go to Settings > Themes

    Scroll down where you see the Classic Themes gallery and select the Tree theme

    Now when the weather is bad, like at this time of writing, you will see this in the background of your Inbox.

    Gmail with the classic theme - Tree
    Thunder and dark skies showing on the Tree theme

    And when the weather is good, which was what happened a few hours later, you will see this.

    Tree theme in Gmail
    Clear sky finally




    All Mobiles Secret Codes




    Samsung Secret Codes

    Software version: *#9999#
    IMEI number: *#06#
    Serial number: *#0001#
    Battery status- Memory capacity : *#9998*246#
    Debug screen: *#9998*324# - *#8999*324#
    LCD Contrast: *#9998*523#


    LG Secret Codes


    LG all models test mode: Type 2945#*# on the main screen.
    2945*#01*# Secret menu for LG
    IMEI (ALL): *#06#
    IMEI and SW (LG 510): *#07#
    Software version (LG B1200): *8375#
    Recount cheksum (LG B1200): *6861#
    Factory test (B1200): #PWR 668
    Simlock menu (LG B1200): 1945#*5101#
    Simlock menu (LG 510W, 5200): 2945#*5101#
    Simlock menu (LG 7020, 7010): 2945#*70001#


    Motorola Secret Codes

    IMEI number:*#06#
    Code to lock keys. Press together *7
    Note: [] (pause) means the * key held in until box appears.
    Select phone line - (use this to write things below the provider name):
    [] [] [] 0 0 8 [] 1 []
    Add phone book to main menu:
    [] [] [] 1 0 5 [] 1 []


    Nokia Secret Codes

    *#06# for checking the IMEI (International Mobile Equipment Identity).
    *#7780# reset to factory settings.
    *#67705646# This will clear the LCD display(operator logo).
    *#0000# To view software version.
    *#2820# Bluetooth device address.
    *#746025625# Sim clock allowed status.
    *#62209526# - Display the MAC address of the WLAN adapter. This is available only in the newer devices that supports WLAN.

    Monday, February 3, 2014

    How to show Blog title after Blog post title

    Showing blog title after blog post title is the most important Search Engine Optimization trick that most of the bloggers apply to their blogs for making their blog posts search engine friendly.If your blog title appears before blog post title then Google will give perence to your post only when someone search your post giving your blog title at first of the search texts,for which the user should know your blog title at first,which will be difficult or nearly impossible for you.
      By placing the blog title after blog post title,you can make your blog more likable by Search engine,because now those user can find your blog who dont even know your blog title.


    To apply this trick follow the following steps caully
    1) Go to Blogger------Design------Edit HTML
    2) Backup your template
    3) Search for the following codes
    <data:blog.pageTitle/>

    4) Replace it with the following codes

    <data:blog.pageName/> | <data:blog.title/>

    <data:blog.pageTitle/>


    5) Save the Template

    Asus PadFone 2 phone in a tablet released with quad core processor and ICS


    The PadFone 2 is not only bigger and faster, it is, combined, lighter than Apples new iPad, add to that one of the most powerful processors in a smartphone and youre onto a winner.

    Asus has unveiled the new PadFone 2 smartphone and tablet hybrid in Milan today running Ice Cream Sandwich and sporting a larger 4.7-inch HD display and quad-core S4 processor.

    The PadFone 2 has had a bump in the screen department going up to a Galaxy S3 rivaling 4.7-inches whilst swapping the original OLED panel for an integrated Super LCD which means brighter, sharper and as weve seen in the iPhone 5, a lot thinner.

    Under the hood is where things get really impressive however as the PadFone 2 sports Snapdragons new S4 quad-core processor making it one of the most powerful smartphones on the market. Theres 2GB of RAM making sure that no matter what youre doing the PadFone 2 wont even break a sweat.

    The camera has been given a massive boost now offering up 13MP along with Full-HD video recording, theres also NFC for those that like their payments wireless and Asus Cloud offering cloud storage across Asus devices with a hefty 50GB at your disposal.

    Using a Micro-USB/HDMI hybrid connector the PadFone 2 docks with the station making the transition from smartphone to tablet now instantaneous. What you get then is a 10.1-inch 1280x800 IPS display along with a juice boost of 5,000mAh making sure you wont be running out of power anytime soon.

    Coming in 16GB, 32GB and 64GB flavours theres no word on official pricing, but by looking at US pricing expect both smartphone and tablet to be costing roughly iPhone 5 money, which when you think about it, is actually pretty good value. 

    Sunday, February 2, 2014

    How can You Know Where A Shortened URL Leads To Without Clicking

    I am sure you remember the days of using the tinyurl service where you can shorten a long and verbose URL   into a shorter and succint one. In recent times, these URL shortening services are becoming more useful because of the popularity of Twitter and its 140 character limit that it imposes on users.


    Tweet from Seth Godin containing a shortened URL
    Example of a shortened URL used in a Tweet

    If you are wary about where clicking the link may lead you to, you can make use of an online service called Where Does This Link Go?. The service is simple to use. Just copy and paste the URL into the text box and click on Expand.

    Inserting the shortened URL in wheredoesthislinkgo.com
    Copy and pasting the shortened URL and click Expand
    You will see the expanded version of the shortened URL immediately. Now, you can decide if you want to click through. As an exercise, try to identify this link http://bit.ly/16AtJWi, which is the my blog post.

    Shortened URL expanded on wheredoesthislinkgo.com
    After expansion, you can see that the shortened URL is coming from the authors website
    Use this for shortened URL that you find dubious, and it might just save you an unwanted trip to a malicious site or two. If you have found this short post useful, please share it with your network. 

    HOW TO LOCK DOWN AND SECURE YOUR PC WITH PREDATOR

    This post is about an unsual way to use your USB mass storage device as a tool to secure and lock down your computer for restricted access. Here, your USB mass storage serves a the key to unlock and lock down your PC. Once it is inserted into your Pc It automatically unlock your pc and when once removed, it locks down in a couple of micro seconds. Whether you like it or not a good security measure Is something everyone needs to pull by the side when dealing with anything in this life.

    To do this little trick, I will be introducing to you a window application called PREDATOR that helps you to do this. Predator is the window application you need if you are the security conscious type. It prevents others from hacking into your system files when you are not available. Its more convenient than closing your Windows session, if you ever have to and does not require you as an authorize user toretype your window password when you return.


    KNOW HOW IT WORKS

    Now let me come down to how this very little shit works.
    • Like I said earlier Predator helps you to lock down your Pc/laptop when you remove your USB flash (mass storage Device) while your widows session is still running by darkening your window screen and making your PC/laptop key board and mouse to become totally inactive for anyone or any unauthorized user.
    • One wonderful thing about this application is that it also helps as a tracker and keeps activity logs that enables you to know people who made attempt to use your computer.
    • Predator also helps you to set an alarm that keeps away or freak out intruders. Maybe youre are in a public place operating your Device and at the same time you have a "here and there" movement to do within that area, instead of getting so worried about who to look after or watch out for you PC, just relax and and keep your ears alert to hear an alarm when someone touches it and thats all.
    • Predator also disables ALT+CTRL+DEL on your system, this make it very hard and rigorous for for anyone who is up for a fast one to terminate and kill program process through TASK MANAGER in which predators will certainly happen to be among them.
    • Now come to think of if what if your USB mass storage gets missing... Yes it may happen but then you can still access your Pc with a special Password that you must Have created at the time of installing predator on your system. All that I am going to explain later On in this Post

    System Requirements for Installing predator

    PREDATOR is availble on the following operating systems:
    32-bit based systems
    Windows 8 (all editions)
    Windows 7 (all editions)
    Windows Vista (all editions)
    Windows Server 2008
    Windows Server 2003
    Windows XP SP3 (all editions)
    64-bit based systems
    Windows 8 (all editions) 64-bit
    Windows 7 (all editions) 64-bit
    Windows Vista (all editions) 64-bit
    Windows Server 2008 x64
    Windows Server 2003 x64

    PREDATOR will not work with other versions of Windows than those indicated. If the Microsoft .NET Framework 4 Client Profile is not installed on your computer, the PREDATOR installation program will do it for you.



    Download Predator forWIN 32Bit and WIN64bit

    HOw To Install Predator

    1. Download Predator free edition InstallPredator.exe and Install it in your PC.After installing run the application from Windows program menu or the desktop shortcut icon.
    2. You will get a message box like this Insert your USB flash drive and click OK to continue.
    3. Now the perence window will appear. Here you can set the screen darkness,start-up mode,and other options by checking in the check boxes.
    4. In the Change Password field put your new password when you are configuring 1st time. Select the Drive letter in your computer which indicates the USB drive of your computer. Now press “Create Key” button and it will successfully create the key file in your USB flash drive.
    5. Now click OK.
    6. Check in the system tray.If the Predator icon is blinking then everything you have done is OK an ready to lock your PC.

    STARTING OFF WITH PREDATOR

    To get started with this trick to lock down your PC for security purpose, all you have to do is adhere to all the steps Given below

    To start monitoring your PC
    Insert your key Run the software via the Start Menu / Programs / Predator item or via the PREDATOR icon on the Desktop Make sure that the PREDATOR icon flashes in the taskbar


    When you go away
    Look at the PREDATOR icon in the taskbar: if it is red, wait. If it is green and blinking, remove the key.
    The desktop will be locked in a few moments, depending on the settings you have chosen. If somebody tries to use your PC, PREDATOR shows the password dialog and starts a countdown.
    If an invalid password is entered, PREDATOR sounds an audible alarm and displays a blinking Access Denied sign.

    When youre back
    Insert the key. The desktop will be unlocked in less than a second. If somebody has tried to use your PC, PREDATOR automatically opens the Log window and shows the failed access attempts

    To stop monitoring your PC, temporarily or permanently
    Click on "Pause monitoring" or "Exit" from the context menu

    To verify or tell if someone tried to used your PC while you were away,
    Click on "View log" in the context menu and see all logged activities.


    FAQ:


    Can I make a copy of my USB drive and give it to someone else to use on my PC ?
    No, you cant make a simple copy because PREDATOR has a unique copy-protection scheme: if someone tries to copy a PREDATOR key, the copied key will be useless. If you need several flash drives to protect your computer, you must prepare them with the "Flash Drive" section of the Perences window. For instance you can make a spare key to unlock your computer in case you lose your main key, or you can give their own keys to some trusted persons to allow them to use your PC. Return to FAQs main index

    What is the minimum size of the USB drive needed to operate PREDATOR ?
    Any USB drive size will just be okay do so long as PREDATOR finds a 1KB free space to writes its protection codes and can be found on the USB Drive as "predator.ctl" and is located at the root of the drive.
    What if I lose/break my key ?
    This may be very risky. Its like locking your room and swallowing the Key Up(.....wondering where u r going to lay ur head to rest for that day). Now if this ever happens, then Run Predator, and wait for the screen to go blank, click anywhere on the screen with the left mouse button, then press the Enter key 3 times to display the password dialog box
    Kindly type your password as required to enable you have access once again
    Insert a new flash drive (mass storage Device)
    Right-click the PREDATOR icon found on the taskbar and click the Perences item Prepare your key as shown in the paragraph USB Flash Drive in the Settings page. And thats all.
    What if I forget my password?
    Run PREDATOR as Administrator and click the "Reset Password" button, to reset your password,
    After that kindly Click the close button to quit the program

    You can click here for more Info about Predator Here!

    Saturday, February 1, 2014

    Disable Windows Messenger on a Windows XP


    Note: This tip applies only to Windows XP Professional.
    If youre using MSN Messenger as your chat and videoconferencing tool, you may never use Windows Messenger anymore and have removed it from the startup group to keep it out of your way. However, you may have seen it pop up on occasion and had to struggle with closing it down. The reason that Windows Messenger makes these impromptu appearances is that Outlook, Outlook Express, and even some Microsoft Web pages can still make it load automatically. Fortunately, you can banish Windows Messenger from your desktop by making an alteration to the local group policy with the Group Policy Editor. Heres how:
    1.  Access the Run dialog box by pressing [Windows] + R.
    2.  In the Open text box type Gpedit.msc and click OK to launch the Group Policy Editor.
    3.  Go to Computer Configuration | Administrative Templates | Windows Components | Windows Messenger.
    4.  Double-click the Do Not Allow Windows Messenger To Be Run setting.
    5.  In the resulting dialog box, select the Enabled option and click OK.
    6.  Close the Group Policy Editor. 

    Odesk Earn up to 200 per month

    Odesk is a freelance jobs online. You only need a skill and a computer with internet connection. It is very simple to earn from odesk. First is to register an account, build a good profile, create a good cover letter and save your past works on portfolio.

    Another good thing in odesk is that you can have multiple work if youre hard working. You can earn more than 200$ depends on your skill. Whenever you want to cash out your earnings, just click on widraw then select your perred bank account.

    Friday, January 31, 2014

    YOUR FREEDOM E BOOK DOWNLOAD LINK

    here is my earlier promissed your-freedom ebook for you guys.
    just follow the step by step guide click here to DOWNLOAD NOW!

    10 App Bundle Offer from MacUpdate Last Day!

    Just found out about this promo, so a quick short post for you guys

    You can get the following apps for a special bundle price of $49.99 (normally $618)


    These are the 10 apps on offer:
    1. Parallels Desktop
    2. DEVONthink Pro
    3. Prizmo
    4. MacUpdate Desktop
    5. MotionComposer
    6. 1000 Fonts
    7. iStat Menus
    8. PhotoStyler
    9. DiskAid
    10. Internet Security
    Only 1 day left as of this writing. Some of the apps on its own is worth more than the bundle price, like Parallels Desktop and DEVONthink Pro, so you have been eyeing any of these apps, head over to the MacUpdate site before the promotion is over.

    Thursday, January 30, 2014

    Search Engine Optimization Tips And Guidelines

    Search Engine Optimization is very essential for every webmasters to get  more visitors to their websites from search engines. Popular search engines includes Google, yahoo, bing and many other. Traffic from search engines are considered as organic traffics. These organic traffics matters a lot if you are serving advertisements in your site as they pay more for organic traffics.


    We will discuss about some tips and guidelines that every webmasters should follow for optimizing their sites in search engines. Higher the position of your links in the search engines, higher the chances of your links getting clicked and more number of visitors to your site. Ultimately, it helps in the success of a site or blog.  Read this guidelines caully for optimizing your site .

    Guidelines for optimizing a site:

    1) Site usability is very much essential  for your site visitors. Make sure that your website is easy to use and navigate for your visitors. Make your site user friendly so that visitors keep coming to your site regularly. 

    2) Getting correct keyword and key phrases is very essential for a website to get targeted traffics to your website. Collect information about keywords and phrases that drives more traffics to your site.

    3) Page titles are very much important. Use your keywords in title tags. Have your most important keywords first and then the second and so on.

    4) Keep adding good content very often. Keep adding unique content which is optimised for search engines . Readers get attracted to unique and good contents and they will come back again and again.

    5) Install Google analytics. It helps you to keep track about how your hard work is affecting your performance.This is a great analytics software/tool and is free. Also sign up for Google webmaster tools, this gives you a good idea about your top search queries, your indexed pages, any problems with your pages/URLs and links pointing your pages.

    There are many ways to optimized your site in search engines. Keep following them to get better results. I advised you to not follow any kind of illegal procedure to get your site optimized in search engine.

    How to Save Articles for Reading Later on Feedly

    With the imminent demise of Google Reader, Feedly has been one of the favorite alternatives among many RSS readers. This post looks at how you can save a web article on Feedly for future or later reading.

    When you are reading an article in Feedly, you may want to save it for later reading because you may not have the time now or you want to er back to the article as some later point in time.

    While in the article, click on the Save icon on the top right hand corner of Feedly. You will save a Saved indication on the top middle section. Clicking the Save icon will unsave the article.

    Saving a web article in Feedly
    Clicking on the Save for Later icon saves the article in Feedly

    Once saved, you can at a later point in time access the articles simply by heading to the Saved for Later section which will keep all the articles you have save. Again, to unsave, just click on the Save icon again once you are done reading.


    Going to the Saved for Later section in Feedly
    Go to the Saved for Later section to read the saved articles

    Wednesday, January 29, 2014

    Preview the Latest Blackberry z10 on your iPhone

    If you have not, you can now not get your first glimpse of the latest Blackberry z10 from the comfort of your iPhone. Just point your mobile browser here. Get ready for an interactive experience.


    An interactive demo of the Blackberry z10 (mobile browsers only)



    How to Recover Your Password from Google Chrome

    Who hasnt forgot their password to some accounts, especially with the proliferation of accounts to sign up to nowadays. And it gets harder if you have been inactive user. Heres how to quickly recover your password in the Chrome browser.

    Click on the Customize and Control Google Chrome button and then click on the Settings option.


    Settings page in Google Chrome
    Go to the Settings page in Chrome

    Click on Show advanced settings and then Manage saved passwords. Search or scroll down to the account and click on Show to see the saved password.

    Saved password page in Chrome
    Click on Show to see the pssword in clear 

    Tuesday, January 28, 2014

    How to add a border around every blog post

    This tutorial will show you how to add border with curve corner to each of your blog posts. The process is very simple it is all about adding some lines of codes to your template. However one can also change the background color of the post body by following this tutorial. I have found it very handy to give a perfect look to my post so that reader like my post from all aspects like quality and looks. Since it was helpful for me so it might also be helpful for you, keeping this mind i bring this tutorial to you. So read it caully and give a perfect look to your posts.


    Live Demo


    Follow the following steps:

    1) Go to Template------Edit HTML-------Expand Widget Templates
    2) Search for ]]></b:skin> by pressing Ctrl+F
    3) Now paste the following codes just above ]]></b:skin>


    .post{border:1px solid #E5E5E2;border-style:solid;border-radius:10px;
    -moz-border-radius:10px;
    -webkit-border-radius:10px;background:#ffffff;margin:.1em 0 .5em;padding:0px 8px 0px 8px}

    4) Now click on Preview and then Save Template


    Customization


    1) To change the border color replace #E5E5E2 by your color code.
    2) To adjust the border corner curves change 10px to your desired value.
    3) To change the post background color change #ffffff by your color code.

    Thats all about the tutorial. Subscribe Us.

    List Of Full Form of Domain Names Extensions

    • .com → Commercial Internet Sites.
    • .edu → Educational Sites .
    • .firm → For an Internet Site For a Business.
    • .gov → for a U.S. Government site On the Internet.
    • .int → International Institutions.
    • .mil → for a U.S. Military Site on the Internet.
    • .mobi → for Mobile Phones.
    • .nato → for NATO sites.
    • .net → for Internet administrative sites.
    • .nom → for a Personal site on the Internet.
    • .org → for Organizational Internet sites.
    • .store →for a retail business.
    • .web → for an Internet site that is
    • about the World Wide Web.
    • .Us → United states
    • .uk United kingdom

    In 1998 - We have 8 extensions
    In 2004 - We have 23 extensions
    in 2013 - It will be 700+ new domain extensions released to the public.

    Monday, January 27, 2014

    How to make a RAR folder

    Most of the softwares that we download from the Internet are in .rar file format, and we use to extract it to get our desired software, but most of us do not know how to make a rar file or how to make a compress file.Todays tutorial will show you how to make a .rar file and also teach you how to make it password protected.

    Why it is necessary

    Do you get bored by searching for a perfect software to hide your personal documents. Then stop thinking about that because this tutorial will teach you how to hide your files using Winrar, which we use to extract compress files. Make the full use of Winrar rather than stick on extracting compress files. However it stands little bit unsatisfactory when we compress large files because it takes to much of time. But you can use it fully to hide small files like some kind of documents, images, video files etc. It is necessary in the sense that we can super hide folder and files not only setting password but also can compress the file size.
    First you have to install Winrar in your Computer,if you do not have,you can download it from the link bellow.
    • Download WinRar
    In the following tutorial i show you how to compress 4 images to one .rar file.You can generalize it for all type of files (image,text,pdf etc)


    Follow the steps caully


    1) Press Ctrl+A to select all 4 images,then right click on it,and got to Add to Archive






    2) After that you will get a window like this



    Follow the steps as shown in the above image


    3) Then go to the Advenced menu,after that a window will pop up like the following image-1,go to Set password and give the password as shown in the image-2 and press OK




    And finally you will get a .rar folder,now if you extract this folder you will get back the earlier 4 images.


    • If you are getting any problem,write bellow in the comment field

    Error xinput1 3 dll is missing

    The program cant start because XINPUT1_3.dll is missing from your computer.This problem is already solved in a simple way. The problem occurs when you try to install nba 2k12, 2k13 or any version of nba because of failure on installing the latest directx version. To solve the problem, download the latest DirectX End-User Runtime from Microsofts website.

    1. Go to http://www.microsoft.com/en-us/download/details.aspx?id=35
    2. Download the file.
    3. Install dxwebsetup.exe and wait until finish.
    4. Then restart your computer.

    Now, The Error xinput1_3.dll problem is already been fixed. always remember that when installing a program, make sure to install the microsofts software included with it.

    Sunday, January 26, 2014

    Hiding LinkedIn Activities Updates

    If you are on LinkedIn and have made some connections, you will surely have gotten some email updates at some point in time that about some activity updates from your connections. Of course, the opposite is true as well, your connections will be broadcast to your connections as well.

    What if you did not want to broadcast your activities, like when you need to make some major updates during a job hunt. All you need to do is to make a simple settings change in LinkedIn.

    Go to Accounts & Settings in the top right of the page and click on Privacy & Settings.

    Select Privacy & Settings
    Select Privacy and Settings 

    Click on Turn on/off your activity broadcasts in the Privacy Controls group

    Privacy Controls Setting in LinkedIn
    Privacy Controls Settings in LinkedIn

    Uncheck the selection "Let people know when you change your profile, make recommendations, or follow companies" and you are done.

    Activity broadcasts setting in LinkedIn
    Option to turn off Activity broadcasts in LinkedIn


    10 STEPS TO TROUBLESHOOT YOUR ZTE OR HUAWEI MODEM

    Due to the large number of complains I get on countless occasion from different modem users, I have decided to make this post that can help you fix some bug and troubleshoot your modem. There are several reasons why you re unable to connect your modem to your PC to access the internet. some many have complained of "device disconnected" or device not available when they try to connect their modem to the internet. Sometimes SIM is not detected or SIM is said to be invalid. And sometimes you get the message on modem installation that says "Device not successfully install" or you get device "driver not found".

    Now the One million dollar question is; how are you to go about this? how do yo get alll these solve to get your modem in a working condition.Should I get a new modem in this case?

    Now before You think of getting a new modem, try the following steps caully and make sure you hid to every instruction.

    [1] 1ST MAKE SURE THE SIM IS PROPERLY INSERTED


    You should probably see direction for use on your modem pack or right on the modem that shows you the correct way to insert SIM into your modem

    [2] MAKE SURE YOUR MODEM IS UNLOCKED OR YOURE USING THE RIGHT SIM

    With the advent of Customized Modem from different network provider, youre are sure to get an error message that shows SIM is not accepted when you insert SIM from another network provider. You can get passed this by simply getting your Modem unlocked so it can accept SIM from other network provider.

    [3] MAKE SURE U USE THE APPROPRIATE APN SETTINGS FOR YOUR HUAWEI OR ZTE DEVICE


    Make sure you create a profile on your modem bearing the right APN settings for the right SIM inserted. You can create several profile as much as you please.
    APN Settings for GloAPN: gloflat
    username: web (or leave blank) passord: web (or leave blank) access number: *99#

    APN Settings for AirtelAPN: internet.ng.airtel.com
    username: web (or leave blank) passord: web (or leave blank) access number: *99# (similar to the settings for BIS on PC )

    APN Settings for MTNAPN:web.gprs.mtnnigeria.net
    username: web (or leave blank) passord: web (or leave blank) access number: *99#

    APN Settings for EtisalatAPN: etisalat
    username: web (or leave blank) passord: web (or leave blank) access number: *99#

    [4] TRY REINSTALLING THE SOFTWARE OR DASHBOARD IN SAFE MODE

    You can kindly unistall the modem software (dashboard) and try re-installing it in a Safe Mode (...I guess youre already know how to do this ).Its as simple as holding or taping F8 on your PC before window loads... just as soon as you press the power button or press F1 on our desktop and type Safe mode to search for more info)

    [5] MAKE SURE YOUR FIREWALL IS NOT BLOCKING YOUR MODEM SOFTWARE TO CONNECT DIRECTLY TO THE INTERNET

    You should also make sure that your firewall is not preventing internet connect from your device. You can do a proper check and try connecting again.

    [6] MAKE SURE YOU HAVE A DATA PLAN THAT IS ACTIVE FROM EITHER GLO, ETISALAT, MTN, OR AIRTEL E.T.C

    Getting a data plan of your choice should not be your problem, cus all through this blog, I have littered and exhausted i know about available data plan on all network.
    I guess you should Check:
  1. Glo Recent Data Plan
  2. Aitel BIs Data Plan On PC
  3. Etisalat Data Plan for BIS
  4. Mtn New Data Plan With Extensive Validity
  5. [7] THEN YOU CAN TRY OTHER SIMS TO CHECK IF IT IS SIM PROBLEM. NOT ALL SIMS CAN BROWSE

    Yes, Its true, not all SIM can browse no matter what you do to that SIM. All SIMs are made differently

    [8] CHECK IF MORE THAN ONE MODEM IS INSTALLED ON YOUR SYSTEM AND DELETE THE ONES YOU DONT NEED.

    It has happened to me. I installed several modems on my PC. When I tried connecting it says "device disconnected", when I uninstalled all the modems, I installed only one and it started working. I noticed also that, it also work on USB ports and doesnt work on the other. But after the above step, it all got solved.You can uninstalled them from your control panel through uninstallation.

    [9] YOU CAN RESTART YOUR SYSTEM AND TRY CONNECTING ONCE AGAIN.


    If youve done the above steps, then you can quickly do a restart so as to beginning connection on a fresh note

    [10] FINALLY YOU CAN EITHER FLASH AND RE-INSTALL THE MODEM FIRMWARE OR DO AN UPDATE.

    You should do this if only the above mentioned steps proved abortive. This very steps helps you to flash, re-install and update to your modems firmware and Dashbord. This is the final antidote to any stubborn modem.

    You can click the like button if deem this Post helpful

    THANKS

    Saturday, January 25, 2014

    How to Search Text in Chrome on Your iDevices


    If you use Chrome to visit your favorite websites on your iDevices, here is a simple tip on how to search for text within you web pages loaded in Chrome.

    First, drop down the menu next to the address bar. Select Find in Page...


    Chrome browser for iDevices
    Select Find in Page... from the drop down menu in Chrome


    Type in your search text and the search text will be highlighted wherever they appear in the content. This gives you a quick visual of where the keyword is located and helps you to zoom in onto sections of the article that are of interest to you.

    Searching text on a web page in Chrome
    Search text highlighted on the web page in Chrome

    Related article
    • How to Find Text on Page in Safari on Your iPad

    Friday, January 24, 2014

    How to Like a Video and Leave a Comment on YouTube

    Liking and commenting on YouTube video is a way to provide and share valuable feedback or insights on videos that you have watched and like and to participate as part of a wider community. Heres how to do it.

    Click on the "Like" icon to register you like for the video, like so.



    Scroll down to the comments section. You will see all the comments with the latest ones at the top. Type in your feedback or reasons why you like the video into the box, up to a maximum of 500 characters. Once you are done, click on the Post button to post your comments live.


    The next screen will ask if you want your comments to be public on your own channel. Click Ok.



    Once your comments are live, you can still, as the author of the comments, be allowed to remove it if you wish to do so. Just click on the down arrow button and click on the Remove option.



    I like to hear your feedback in the comments section below and please share this article with anyone who might find it useful.