Wednesday, December 17, 2008

What Do You Know About Blog and Ping Software Review?

Word press and RSS to Blog are one of the most widely used software’s by people all over the world. They automatically send information about your site and links to all the blog sites at the click of a button. They can save your list of links for future use also. Very good software to use for blog and ping is BlogSolution. BlogSolution is one of the most advanced blog, ping and SEO software’s around. It brings in results quickly and it is very effective or visit www.software-index-website.com. You can make your site easily searchable by search engines as the software posts your links directly on thousands of blogs in one go. The whole process can be achieved thorough the click of a button.

BlogSolution can at least creates hundred blogs a second using its own highly advanced blogging platform. BlogSolution is a multi manager as all your BS2 domains can be managed from a single place. It easily interlinks your sites and also posts one way links to your sites. There is a very good feature by the name of Smart jobs that automatically creates blogs in your absence.

BlogSolution indexes entries very quickly using the Indexing Turbocharger which leads to extremely fast indexing. BlogSolution can get more spiders than any other blog software at present. The interface of BlogSolution is extremely simple to use and is very user friendly. You can learn the full use of BlogSolution within a short period of time with its help tool. There are also video tutorials provided with the package. Using BlogSolution you can post hundreds of one way links on various sites.

If you use BlogSolution then you don't need to use any other blogging solution. BlogSolution takes care of all your blogging needs and brings in positive results for your site very quickly you can visit www.scripts-to-sell.com if you would like to test BlogSolution first before buying it then you can download demo software from the BlogSolution website. Once you are satisfied with its performance you can buy the software online paying through your credit card.

Hence we see that BlogSolution is the best blog solution ever found. The users of BlogSolution have found it to be extremely effective and also they would not like to use any other blog software. It is the next generation software that has taken the world by storm with its simple user interface and bringing in positive results for all its customers. Watch your income grow as more and more people can find your website on the search engines and order for products and services.

Article Directory: http://www.everyonesarticles.com

www.viral-toolbar-builder.com www.software-index-website.com

video

http://www.youtube.com/watch?v=BIwqMXPjnLU

How to Make an Animation Movie with iKITMovie

When animation is used for films or movies, each frame is produced on an individual basis. Frames can be produced using computers or photographs of images that are either drawn or painted. Frames can also be generated by altering a model unit in small ways and using a special camera to take pictures of the results.

Though the work of producing animated movies and cartoons can be intense and laborious, computer animation can make the process much faster. Computer technology is steadily improving, and professionals are able to create life-like characters using computers and special animation software. However, skilled animators are still necessary for producing quality animations. After all, computers are not yet capable of making artistic choices and bringing real passion to simple images.

To create a stop motion animation, you need a webcam or a basic digital camera (preferably mounted on a tripod for stability) and any video editing software (like Windows Movie Maker, Adobe Premiere Pro, Apple iMovie, etc)

Instructions

Step1 : Open your iKITMovie program (making sure your webcam is connected and working)

Step2 : Choose your preferred resolution for capturing your images.
Its best to use 640x480 pixels if your camera can handle it!

Step3 : Lighting is essential - so make sure your desklamp or even better desklamps are on and directed downward on your object that you want to animate.

Step4 : Make sure you turn off your auto White balance feature on your camera and ensure that you focus either manually or digitally (depending on the camera you have). Now start taking snaps moving the object bit by bit for each frame and enjoy.

Bonus Tip: If you like your characters to jump in the stop-motion animation video, attach them to a thin wire and lift the wire a few centimeters in each frame. If the wire is of the same color as the background, it won't be visible in the final movie.

http://www.articlezap.com

video
http://www.youtube.com/watch?v=31xvh-itXiM

Can free security save the web?

Protecting Windows from malware has always been a sensitive subject for Microsoft, given that many people blame the software giant for causing all the problems in the first place.

The operating system is notoriously susceptible to attack and Microsoft has known for several years that it must do more to protect users. Malware is so pervasive that one could argue Windows isn't fit for purpose out of the box - any PC connecting to the web without security software is living on borrowed time.

Therefore, Microsoft has been treading a fine line since launching its OneCare security product two years ago. Critics claimed the firm was charging Windows users for a second product just to make sure the first operates safely. It's a bit like buying a car, only to find out the brakes are an added extra.

This is slightly unfair on Microsoft, whose software is a target for hackers and malware writers largely because it's so widely used. And over the past 10 years we've come to terms with having to fork out for third-party security software.

However, if you believe some of the headlines over the past few weeks, that may be about to change. Microsoft announced that it will kill off OneCare next summer, and replace it with a free antivirus product codenamed ‘Morro'.

At the heart of this strategy is a drive to increase the number of computers with antivirus protection installed. Microsoft cites some pretty worrying statistics to explain the problem: as many as 50 percent of computers aren't properly protected. This seems an incredible figure to those of us who have been studiously installing and updating antivirus for years.

Microsoft contends that many consumers are confused by the bloatware that's preinstalled on brand-new PCs - they think a trial version of Norton ensures they've got security sorted, blissfully unaware that it can become a hindrance once the 90-day trial is up. So, despite running on OneCare's less-than-convincing antimalware engine, Morro will be better than nothing.

But Morro won't include the bells and whistles provided by specialists in the field, such as Symantec, McAfee and Kaspersky; the latest suites offer a combination of malware protection, PC optimisation, antispam and backup features. Microsoft is unlikely to provide these for free because of antitrust concerns.

However, if Morro convinces those who take a slack attitude to security to finally get some antivirus protection, their systems will present less of a threat to the internet at large. Unprotected PCs are an easy target and many of them are recruited into the botnets responsible for distributing malicious code in the first place.

So while the prospect of a Microsoft product that's secure out of the box remains a distant one, Morro is a step in the right direction that could benefit us all.

Do-it-yourself security

You can, of course, already get security software for nothing. Some of the products that made it into our list of the 50 best Windows programs provide decent protection from online threats, and many of them are free.

The only problem with a do-it-yourself security setup is that it takes a bit of managing and updating. You won't be able to leave these products running in the background unattended. But for those who like to get their hands dirty, there are some real gems. Pick up a copy of our February issue to see for yourself.

http://www.pcadvisor.co.uk/blogs/index.cfm?entryid=107724&blogid=4

Eliminate the copies of backup created during the installation of patch and Service Pack

Often it can turn out useful to recover precious space on disc. Every time that modernizations and Service Pack for Windows are settled, the operating system, usually, memorize a copy of all the modified rows or eliminates you of folder \ WINDOWS or \ WINNT inside.

This operation comes completed in order to render, possible eventually, in a successive moment, the reinstallation of one or more patch (or than an entire Service Pack). In case, after a period of test, problems are not found - concluded the installation of or more patch - are possible to eliminate all the rows of backup being recovered therefore a space P2o on fixed disc.

Now go in folder \ WINDOWS or \ WINNT therefore activated the visualization of folder and the hidden rows (the menu Instruments, Options folder, Visualization, Visualizes files and hidden rows). You would have to see to appear, in folder \ WINDOWS or \ WINNT, a list more or less thick than file whose name begins for $NtUninstall or with $NtServicePackUninstall.

In case, after the installation of the several ones patch, you have not found some relative problem to the operation of yours personal computer, is possible to proceed to the elimination of the entire file $NtUninstall and $NtServicePackUninstall.

http://www.softwaretipspalace.com/MS_Windows_XP/Tips-and-Tricks/eliminate_the_copies_of_backup_created_during_installation_of_service_pack.html

Java Script Framework For Building Google Maps In Minutes

The Google Maps API has been available for free, public-facing sites since February 2005. A remarkable variety of sites (over 30,000 in number) have already integrated Google’s mapping technology using this API. New sites are being built every day.

I have been doing Google Maps on and off from the very beginning. Over time it became clear to me that from the intergration perspective the Google Maps applications should be cost-effective to build, quick to deploy and easy to maintain for both simple websites and complex web applications. While pursuing these goals, I became aware several of important aspects of dealing with Google Maps:

  • There are many good Google Maps tutorials out there; my favorite tutorial is one by Mike Williams

  • Geocoding is great, but some manual work will always be needed; we had to correct spelling errors in addresses and massage addresses a bit before they get properly coded

  • Adding markers to Google Maps is slow (specifically on IE) if you want to place over 100 markers on the map at the same time; this is easily resolved by using elabel.js JavaScript library that is much more lightweight and can handle many more markers; even when using elabel.js avoid adding GEvent to each marker at all costs

  • When using AJAX to bring the map data from the server don’t use XML as data format – use JSON objects as described previously; the JSON objects are hundred times faster and less CPU intensive

  • Make sure that you know JavaScript very well; all over the place Google Maps API uses closures and lambda functions; the structured error/exception handling is not there – if you do something wrong all you will ever get is "Object blah is null"; all Google's own code is obfuscated so you can't understand anything in there; you also have to know how prototype-based inheritance works in JavaScript

  • Obfuscate your JavaScript; the obfuscation is a snap using modified version of Rhino JavaScript engine called Dojo's Compressor, which is a part of Dojo Toolkit; it handles most of JavaScript correctly except for some forms of eval(); this code below will not work after it is obfuscated:

function foo(msg){
alert(msg);
}

function do(){
var msg = "Here we go!";
eval("fo" + "o(msg);");
}

do();

While learning in depth about the Google Maps, I have created several rather complex working map applications. You can view them here:

The examples show the basics of working with Google Maps, but this is not the most intersting thing about them. These examples are built using custom JavaScript application framework. In this framework, the metadata is used to define the filters on the right-hand-side and a table at the bottom of the page. The main metadata file is called manifest.js and it defines all the information about the map. Here is an example of the JavaScript metadata required to configure the Timothy’s Coffee page:

//
// These are the generic framework objects
//


// zone represents one page with map, filters, and table
function oygZone(width, name, desc, url, columns,
rowBuilder, popupBuilder, iconChooser, filtersCaption, filters){ ...}

// column is a column in the data table
function oygColumn(propName, caption, isNum, isSelector, align){ ... }

// all kinds of filters are here
function oygDropDownActionList(caption, lambdas, captions, selIndex){ ... }
function oygOneOfOrAllDropDownFilter(caption, lambdas, captions, selIndex){ ... }
function oygCheckboxFilter(caption, propLambda, checked){ ... }
function oygSubStringFilter(caption, propLambda){ ... }

// spacer without text
function oygStaticSpacer(){ ...}

// old static text
function oygStaticText(caption, align, clazz){ ... }

//
// These are the resources used by the Timothy’s Coffee
//

var columns = [
new oygColumn("wf", "Wireless Internet", false, false, "center"),
new oygColumn("sadd", "Address", false, true, "left")
];


function iconChooser(item){
return "";
}


function rowBuilder(item){
var check = "";

var addNoCou = item.add;
var idx = addNoCou.indexOf(", Canada");
if (idx != -1){
addNoCou = addNoCou.substr(0, idx);
}

return [
item.wf ? check : "",
addNoCou
];
}

function popupBuilder(item){
var bull = "• ";

var buf =
"
" +
"Timothy's World Coffee
" +
item.add + "
" +
"Phone: " + item.pho + "

" +
(item.wf ? bull + "Wireless Internet / Hot Spot" : "") +
"
";

return buf;
}

var filters = [
new oygStaticSpacer(),
new oygSubStringFilter("Address Contains", function(row){ return row.add; }),
new oygStaticText("for example: 'M2M' or 'Yonge'", "center"),

new oygStaticSpacer(),
new oygCheckboxFilter(
"Wireless Internet", function(row, checked){ return !checked || row.wf; },
false
),

new oygStaticSpacer()
];

var oygZones = [
new oygZone(
748, "Timothy's World Coffee", "Timothy's World Coffee (Fall 2006)", "json/20060826/web.js",
columns, rowBuilder, popupBuilder, iconChooser,
"Find Timothy's Near You", filters
)
];

The raw map data is loaded from JSON objects. The JSON objects can have any number of attributes. These attributes in the implementation of the filters and the rowBuilder() and the popupBuilder() callback functions. Here is a part of the complete data file for Timothy’s Coffee page:

"oygMarkers": [
{
"lat":50.994854, "lon":-114.071649,
"add":"6455 Macleod Trail SW, Calgary, AB, T2H 0K3, Canada",
"sadd":"6455 Macleod Trail SW, Calgary",
"pho":"(403) 259-2274", "wf":false
},{
"lat":51.064404, "lon":-114.096480,
"add":"1632 14th Avenue NW, Calgary, AB, T2N 1M7, Canada",
"sadd":"1632 14th Avenue NW, Calgary", "pho":"(403) 210-1266", "wf":true
}, {
"lat":51.046615, "lon":-114.067489,
"add":"225 7 Avenue SW, Calgary, AB, T2P 2W3, Canada",
"sadd":"225 7 Avenue SW, Calgary", "pho":"(403) 266-5457", "wf":true
},
...
...
...
]
}

Now, when I have the framework for building maps, it takes me minutes to create a new working Google Maps application. No manual work – the map, the filters and the table are all built on the fly as defined by the metadata. I am able to reuse the most of the framework's code without actually changing it. Thus, less skill is required from a JavaScript developer to build a new map using the framework. The developer doesn't even need to know how Google Maps actually work...

http://www.softwaresecretweapons.com/jspwiki/javascriptframeworkforbuildinggooglemapsinminutes

Norton software conflicts with Windows XP SP3

Antivirus software from Symantec Corp. may cause the installation of Service Pack 3 for XP to corrupt the Windows Registry by adding unnecessary keys.

Symantec advises users to disable the SymProtect security feature of its products before applying XP SP3.

A Registry fix is needed by the latest XP patch

The latest in the continuing series of problems related to Windows XP Service Pack 3 involves Symantec's Norton AntiVirus. The company recommends that users disable the program's self-protection feature before installing XP SP3.

In a post to Norton's support forum, Symantec senior SQA manager Reese Anschultz suggests that customers disable the SymProtect feature found in various Symantec security products:

To do this in Norton Internet Security 2008 and Norton AntiVirus 2008, uncheck Turn on protection for Norton products on the Options pages of these programs prior to installing XP SP3. Once the service pack is in place, return to the Options page and re-enable this setting.

In Norton SystemWorks 2008, open the Advanced Options under Settings, click Next, choose Norton SystemWorks Options, and select the General tab. Uncheck Turn on protection for my Symantec product.

For other Norton products, read Anschultz's post, which comments that other third-party security products may also cause problems unless some functions are disabled before SP3 is installed.

Some Windows Secrets readers have had to remove Norton AntiVirus completely before deploying XP SP3. While taking this step may sound extreme, reader Bert Smith from Australia was told by a Symantec engineer that he should "follow these instructions" to use the Norton Removal Tool to uninstall Norton Internet Security 2008 before he deployed Vista SP1!

Given what we now know, it may actually be wise for you to uninstall Norton antivirus products prior to deploying SP3, which is XP's latest — and last — service pack. Thanks to reader Jan Levine for identifying this issue in the Microsoft TechNet Forums.

If you find that installing XP SP3 has corrupted your Symantec security product, my fellow MVP Bill Castner has devised a downloadable Registry fix (scroll down the page until you see My "Fix"). Castner first identified this issue along with Jesper Johansson, who's been tracking the XP SP3 problem in his blog.

Johansson also provides a patch for AMD computers that XP SP3 causes to reboot constantly. I described this problem in my May 22 column. For more information, see the following item.

A cure for XP SP3's never-ending reboots

If you're one of the folks whose AMD-based PCs constantly reboot after applying XP SP3, here's how you can recover.

When the system is first booting, press F8 to enter Windows' Safe Mode. Log into the Administrator acccount, click Start, Run, type cmd, and press Enter. When the command window opens, type the following command (don't forget the space after the equals sign, which is required):

sc config intelppm start= disabled

The problem is caused by the presence of Intel drivers on AMD-based systems. Follow the above steps only if you know your PC uses an AMD processor; doing so on an Intel-based machine could render the system unusable.

To determine which processor your system uses, open the Control Panel's System applet and click the General tab. (See Figure 1.)
Figure 1. Open the System applet in Control Panel to verify the type of processor your PC uses.

If the processor listed in the window is "Intel," do not enter the command shown above. An Intel-based system that constantly reboots may be having an unrelated problem. It might be caused by conflicts with antivirus products, as described in my previous item, or something else entirely that no one has yet identified.

As I wrote in my May 22 column, there's no rush to install XP SP3. Wait until we know more about these kinds of conflicts.

http://windowssecrets.com/2008/05/29/02-Norton-software-conflicts-with-Windows-XP-SP3

video
http://www.youtube.com/watch?v=p0pBQsAlgVU

How to submit blogger sitemap successfully and fix the maximum limit issue?

Sitemap is a way to tell search engines about pages on your site that they might not otherwise discover. Google provides a way to submit sitemaps through Google Webmaster Tools.how to create and submit sitemap? For self hosted sites submitting sitemaps is easy but for blogspot(blogger) hosted sites there is a tweak involved. If you don’t follow this tweak; either you will end up with a WARNING and/or the maximum number of URLs submitted will be shown as 26.

So, how can you submit sitemaps for a blogger hosted blog without any warnings or errors?

Suppose you have a site called abc.blogspot.com. The sitemap for this site would be: http://abc.blogspot.com/atom.xml?redirect=false&start-index=1&max-results=100 meaning simply append atom.xml?redirect=false&start-index=1&max-results=100 to your blog URL in Google Webmaster Tools > Sitemaps > Add Sitemap.

Food for the thinking mind: If you don’t include redirect=false, webmaster tools will throw warning. If you don’t include start-index=1&max-results=100, the maximum number of URLs submitted will be shown as 26, always. Remember if you have more than 100 pages on your blogspot site, you would need to include two sitemaps one having an index starting with 1 and ending with 100(start-index=1&max-results=100) and the other having an index starting with 100 and ending with 200(start-index=100&max-results=200)

If you want to keep track of further articles, I recommend you to subscribe to this blog's RSS feed. You can also subscribe by Email and have new articles sent directly to your inbox.


http://reviewofweb.com/blogging/how-to-submit-blogger-sitemap-and-fix-maximum-limit-issue/

video
http://www.youtube.com/watch?v=BsUMd_Sb3n0

Firefox Configuration Tips and Tricks

Use the Firefox browser :

If you type about:config in address bar of firefox, it will open its configuration page, that allows to change a lot of settings.

Here I'm presenting some settings, that can be configured. These tweaks have been tested on high speed networks and cable, they might need to be tweaked for slower connections.

You can follow any of these two steps to config your browser:

  1. Use the about:config screen which lets you add, modify or reset values or
  2. Manually add all of these hacks to the prefs.js.

Option 1:

Type about:config at the location/url bar, this will list all current references, and you can change the settings listed below.

Option 2:

  • Exit out of the browser completely, because if you don't close the browser, it'll overwrite the settings to default.
  • Find your prefs.js file (usually in Drive:\Documents and Settings\USER_NAME\Application Data\Mozilla\Firefox\Profiles\... directory in Windows XP).
  • Backup your prefs.js file.
  • Ccopy and paste the hacks listed below at the BOTTOM of the file.
  • Save the prefs.js file and restart your browser .
<---- Begin copy selection Below this line ---->

// Performance
// This will allow Firefox to maintain it GUI memory so that the browser window
user_pref("config.trim_on_minimize", false);

// Specify the amount of memory cache:
// -1 = determine dynamically (default), 0 = none, n = memory capacity in kilobytes
// If you have the memory to spare, enabling this will run things a little smoother
user_pref("browser.cache.memory.capacity", 65536); //<-- thus equal about 64 megs, drop down to less if you can't spare the RAM

// Remove painting delay when loading pages
user_pref("nglayout.initialpaint.delay", 0); // Default is 250

user_pref("content.notify.ontimer", true); // Turn on timer-based reflow management

user_pref("content.notify.interval", 100); // Sets the allowed time between reflows in microseconds

// Set the number of reflows to do before waiting for the rest of the page to arrive
user_pref("content.notify.backoffcount", 200);

// Other Tweaks
user_pref("content.max.tokenizing.time", 3000000);
user_pref("content.maxtextrun", 8191);

// Enable Improve pipelining:
user_pref("network.http.pipelining", true);
user_pref("network.http.proxy.pipelining", true);
user_pref("network.http.pipelining.firstrequest", true); // Default is false
user_pref("network.http.pipelining.maxrequests", 8); // Default is 4

// Increase Multi-Threaded Downloading performance
user_pref("network.http.max-connections", 96); // Default is 24 <-- Use this for modems user_pref("network.http.max-connections-per-server", 32); // Default is 8 <-- Use this for modems user_pref("network.http.max-persistent-connections-per-proxy", 24); // Default is 4 <-- Use this for modems user_pref("network.http.max-persistent-connections-per-server", 12); // Default is 2 <-- Use this for modems

// Other Tweaks
user_pref("network.dnsCacheExpiration", 86400);
user_pref("network.dnsCacheEntries", 256);
user_pref("network.ftp.idleConnectionTimeout", 60);
user_pref("network.http.keep-alive.timeout", 30);

user_pref("ui.submenuDelay", 0);

user_pref("dom.disable_window_status_change", true);

// Shows an error page instead of an error popup dialog, have been using this for a long time now
// found this useful if you load multiple pages at the same the dialog box actually holds up the browser
// using this will allow the other pages/elements to load for the rest of the pages
user_pref("browser.xul.error_pages.enabled", true);

// Searching & Type Ahead
// Change to normal Google search:
user_pref("keyword.URL", "http://google.com/search?btnG=Google+Search&q=");

// Find As You Type Configuration:
// Set this pref to false to disable Find As You Type:
user_pref("accessibility.typeaheadfind", true);

// If you set this pref to true, typing can automatically start Find As You Type.
// If false (default), you must hit / (find text) or ' (find links) before your search.
user_pref("accessibility.typeaheadfind.autostart", true);

// Set this pref to false if you want Find As You Type to search normal text too:
user_pref("accessibility.typeaheadfind.linksonly", false);

// Set this pref to true if you require that the link starts with the entered text:
user_pref("accessibility.typeaheadfind.startlinksonly", false);

// This is the time in milliseconds for the Find As You Type to stop watching for keystrokes:
user_pref("accessibility.typeaheadfind.timeout", 3000);

// User Interface
// Enable Bookmark Icons (I love this feature)
user_pref("browser.chrome.site_icons", true);
user_pref("browser.chrome.favicons", true);
user_pref("browser.chrome.load_toolbar_icons", 2);

// Do not Reuse Active Mozilla Browser, create a new one for email links etc.
user_pref("advanced.system.supportDDEExec", false);

// Disable Smooth Scrolling (found it faster to have this off)
user_pref("general.smoothScroll", false);

// Allows for faster mouse scrolling
user_pref("mousewheel.withnokey.numlines", 6); // Adjust this accordingly - Default = 1
user_pref("mousewheel.withnokey.sysnumlines", false); // This must be set to false in order to read previous line

user_pref("extensions.disabledObsolete", true);

user_pref("browser.display.show_image_placeholders", true);

// 1.0 Preview disables dynamic theme switching, this re-enables dynamic theme switching.
user_pref("extensions.dss.enabled", true);

// Mail & News
user_pref("mailnews.start_page.enabled", false);

// always send messages in MIME format (both plain- and HTML-formatted)
user_pref("mail.default_html_action", 3);

// The follow two are disabled for security reasons
user_pref("mailnews.message_display.allow.plugins", false);
user_pref("javascript.allow.mailnews"),

user_pref("alerts.totalOpenTime", 7000);

// Disable this for performance and security issues when reading emails
// Security issues? Yes especially with zlib, jpeg, png and all kinds of new attacks coming out,
// displaying images inline can no longer be taken for granted. This only affects attached graphics.
user_pref("mail.inline_attachments", false);

user_pref("mailnews.show_send_progress", false);

// Security
// Just to make sure, disable windows shell: protocol
user_pref("network.protocol-handler.external.shell", false);

// Show full path for plugin file on about:plugins page
// the full path was removed for security purposes, please keep that in mind
// Note: showing full paths can be a security risk only use when debugging.
user_pref("plugin.expose_full_path", false);

<---- End copy selection Above this line ---->


There are Three files, that can be edited to configure Firefox!

user.js :-
Used to change various preferences.
userChrome.css :-
Used to change the appearance of the browser.
userContent.css :-
Used to change the appearance of web pages.

All these files are plain text files stored in your profile folder, and can be edited using a standard text editor, such as Notepad on Windows and gedit or kate on Linux.

The Profile Folder :

The profile folder is where Firefox saves all your settings and refers to a location on your hard drive.

On Windows XP/2000, the path is usually

%AppData%\Mozilla\Firefox\Profiles\xxxxxxxx.default\, where xxxxxxxx is a random string of 3 characters. Just browse to C:\Documents and Settings\[User Name]\Application Data\Mozilla\Firefox\Profiles\ and the rest should be obvious.

On Windows 95/98/Me, the path is usually C:\WINDOWS\Application Data\Mozilla\Firefox\Profiles\xxxxxxxx.default\ .

On Linux, the path is usually ~/.mozilla/firefox/xxxxxxxx.default/ .

On MacOS X, the path is usually ~/Library/Application Support/Firefox/Profiles/xxxxxxxx.default/ .

Firefox is capable of handling more than one user and thus, more than one profile. The path examples above refers to the default profile that is automatically created when you start Firefox for the first time. You can manage any number of profiles by using the Profile Manager.

%AppData% is a shorthand for the Application Data path on Windows 2000/XP. To use it, click Start > Run..., enter %AppData% and press Enter. You will be taken to the "real" folder, which is normally C:\Documents and Settings\[User Name]\Application Data.

user.js :-

This is the main preferences file for Firefox and is located in you profile folder. The file does not exist by default, so you need to create it before you can start adding your preferences.

userChrome.css :-

This file sets the display rules for various elements in the Firefox user interface and is located in the sub-folder called chrome in your profile folder. As with user.js, this file does not exist by default, so you need to create it before you can start adding your preferences. There's actually an example file that exists by default, called "userChrome-example.css". Basically, you can just rename that file by removing the "-example" part.

userContent.css :-

This file sets the display rules for web content and is located in the sub-folder called chrome in your profile folder. As with user.js, this file does not exist by default, so you need to create it before you can start adding your preferences. As with userChrome.css, there is an example file that exists by default, called "userContent-example.css". Basically, you can just rename that file by removing the "-example" part.


http://www.programmerworld.net/articles/software/firefox_tips.php

Why Defragment Disks?

Hard disks are by far the slowest component in your computer. CPU and memory work much faster than hard disks because they do not have moving parts. Therefore fragmented disks often become a bottleneck of the system performance.

Besides causing slowdowns, fragmentation makes the disk drive heads move too much when reading files which leads to freeze-ups and system crashes. It is important to keep your disks defragmented and optimized as much as possible.

Auslogics Disk Defrag was designed to remedy system sluggishness and crashes caused by disk fragmentation. It is optimized to work with today's modern hard disks. Auslogics Disk Defrag is extremely simple to use, does not require any analysis phase and is faster than most of the other disk defragmentation software. It will help you get the maximum performance out of your expensive hardware investments. And, what’s most important, it's absolutely free.
Defragmentation Explained

Fragmentation is caused by creating and deleting files and folders, installing new software, and downloading files from the Internet. Computers do not necessarily save an entire file or folder in a single space on a disk; they're saved in the first available space. After a large portion of a disk has been used, most of the subsequent files and folders are saved in pieces across the volume.
Fragmentation Maps
Fragmentation Maps [+]

When you delete files or folders, the empty spaces left behind are filled in randomly as you store new ones. This is how fragmentation occurs. The more fragmented the volume is, the slower the computer's file input and output performance will be.

Defragmentation is the process of rewriting non-contiguous parts of a file to contiguous sectors on a disk for the purpose of increasing data access and retrieval speeds. Because FAT and NTFS disks can deteriorate and become badly fragmented over time, defragmentation is vital for optimal system performance.

In June 1999 the ABR Corporation of Irvine, California, performed a fragmentation analysis and found that, out of 100 corporate offices that were not using a defragmenter, 50 percent of the respondents had server files with 2,000 to 10,000 fragments. In all cases the results were the same: Servers and workstations experienced a significant degradation in performance.

I have been a computer consultant since the late 1980's. Working on a host of machines from single PC home users, and complex business networks. I have been recommending and using Auslogics Defrag for the last two years for my clients and have found it to be the BEST defrag program on the market. I have compared multiple software packages and always come back to Auslogic. Especially for Vista users, in my opinion the Auslogics Defrag program simple works better than the default OS defrag program. I highly recommend this software and have not had any instances of incompatibility, which is extremely rare with any software. With over 1500 PC's that I service, this program is a crucial tool for my business. Highly recommend, and always, please support the software companies that make good software work great.

http://www.auslogics.com/disk-defrag

video
http://www.youtube.com/watch?v=6EUEA63LMRU

Firefox 3.1 beta 2, now with private browsing

Mozilla has announced the official release of the second Firefox 3.1 beta. This version introduces the new private browsing mode feature and several other noteworthy changes.

The 3.1 roadmap began to coalesce after the release of 3.0 earlier this year. Firefox 3.1, which is codenamed Shiretoko, will include many improvements and several important features that were originally planned for the 3.0 release but were deferred for various reasons. Mozilla released the first 3.1 alpha in July with some new CSS features, AwesomeBar completion enhancements, and a new user interface for switching between tabs. The second alpha, which arrived in September, introduced support for the HTML 5 video element.

The most significant addition in beta 2 is the new private browsing mode, which will not store any of the user's session information while it is enabled. The feature is similar to the Incognito mode that is offered in Google's Chrome browser and Safari's Private Browsing. The feature was first requested for Firefox back in 2004, but extensive reengineering was required to make the feature work.

The developers drafted a functional specification to document the expected behaviors. Developer Ehasan Akhgari, who participated in making the private browsing feature, wrote several blog entries about the feature at various stages of development. In October, User interaction expert Alex Faaborg discussed some of the relevant user interface issues and revealed that Mozilla would be using a mask icon as the visual metaphor for privacy in Firefox.

http://arstechnica.com/news.ars/post/20081208-first-look-firefox-3-1-beta-2-now-with-private-browsing.html


download for free:
http://rapidshare.com/files/171527398/MyEgy.CoM.Mozilla_Firefox_3.1_Beta_2.by.saysay2000.rar.html

http://www.zshare.net/download/52444824565bb086/

video
http://www.youtube.com/watch?v=6tXTuQXDGiY

Ashampoo Burning Studio 8 v8.04

The complete, compact and easy burning suite
Does your burning software do everything but you can’t find anything?
Did installing it take up several gigabytes of hard drive space and fill up your
Taskbar? Ashampoo Burning Studio 8 is different. It's compact, fast and
amazingly easy to use. You just choose from a list of tasks and the software
guides you through every step. And even though it has all the functions you
would expect from a complete burning suite, the entire software takes up less
than 85 megabytes on your hard disk.

Discs labeled with felt pen scribbles were yesterday. Now you can design and
print cool labels, case covers and booklets in no time. The new Label Designer
comes with a stack of professional themes and it can import track and data lists
directly from the disc you want to label.

If you’ve ever struggled with label design software you will be amazed at how
easy it can be. Just enter a title and any other data and then select one of the
pre-designed themes. Your data is entered in the theme automatically and
you’re ready to print. You can also design your own labels from scratch, but
you don’t have to if you don’t want to.

* Point-and-click label design
* Ready-to-use themes – just enter your title data
* Import track data from your disc
* Design and create:
o Disc labels
o Booklets
o Covers for jewel cases, slim cases, DVD and Blu-ray cases
* Add your own backgrounds, text objects, images and data tables
* Fast alignment and editing tools for images and text

New animated DVD slideshows
You can now turn your photos into impressive DVD slideshows with animated
graphical menus. Just select your photos, select background music tracks and
a theme and burn, that’s all there is to it. The program comes with a set of
professional themes and you can download more from the Ashampoo website.

You’ll be amazed at the impression you’ll make when your friends and family
view your photos on their TV with high-quality animated menus, smooth
transitions, zoom effects and multiple background music tracks!
All they have to do is insert the DVD and press Play.

* Animated graphical menus, many styles available
* Download more themes from Ashampoo
* Put multiple slideshows on a single DVD
* Combine slideshows and videos on a single DVD
* Add your own background music with multiple tracks
* Lots of cool transitions and Ken Burns zoom effect
* Live previews with sound and navigation

Other new features

* QuickTime® support
You can now also use Apple QuickTime® video files as sources for your video discs.
* DVD preview with sound
You can now preview your DVD movies with sound before burning them.
* Improved performance and compatibility
The whole program has been further optimized for faster and smoother
performance and enhanced compatibility.

Standard features and functions
In addition to the new functions Ashampoo Burning Studio 8 also delivers
everything else you could want from an all-round CD, DVD and Blu-ray
burning suite. All functions are available for CD, DVD and Blu-ray.

* Burn and update data discs
Burn data to discs and update previously burned discs by adding and removing files and folders.
* Back up your data to single or multiple discs
Back up your valuable data to one or more discs.
Single backups can span multiple discs.
Restore your backups in a single easy operation.
* Rip and burn music
Rip music from CDs and burn music to audio CDs and MP3 discs on CD,
DVD and Blu-ray in a variety of formats.
* Burn movies and photos to DVDs and data discs
In addition to the new slideshow DVDs you can author and burn video DVDs,
Video CDs (VCD), Super Video CDs (SVCD) and data video discs. Video files
are automatically converted to the necessary formats.
* Copy CDs, DVDs and Blu-ray discs
Just insert a disc, select Copy and you’re ready to burn.
* Create and burn disc images
You can both create and burn ISO, CUE/BIN and Ashampoo’s own special ASHDISC image formats.
* Erase rewriteable discs
Quick and easy erase functions for reusing rewriteable discs.
* Expert burn functions for full control
Burning experts can create modified copies of existing discs
(read in data structure and make changes and additions) and burn
discs of all kinds with full control of all main configuration options.

http://hotfilms.org/softwares/ashampoo-burning-studio-8-v8-04-read-nfo-te-178820.html

download for free:
http://www.filesend.net/download.php?f=6e407dd6cffefbbd360da90a12957a9b

video
http://www.youtube.com/watch?v=Gv6puXdYRlY

Kaspersky Internet Security2009

Kaspersky Internet Security 2009 provides adequate protection, but the program itself could use some work in telling the user what's going on.

We were disappointed with Kaspersky's Internet Security 2009. While there are significant improvements to the anti-malicious-software engine in the 2009 edition — it is faster — we only saw evidence of that during the file scan test. In our application and boot tests, the numbers were actually worse than last year. This highlights our dilemma: the problem is not so much with malicious software detection (it does that very well), but with the execution of the overall program. The installation process required a few too many reboots, and we also experienced more than the usual number of system glitches on our Windows XP test machines. The interface is a little clunky, with messages regarding updates and scans being very unclear. Also, some of the new features didn't seem to be fully developed. From a world-class software vendor, we expect better.

Installation
Kaspersky Internet Security 2009 requires Windows XP or Windows Vista. Our installation on a Windows XP test machine wasn't neat. First, Kaspersky Internet Security 2009 identified both ZoneAlarm and AVG 8.0 as potential conflicts that needed to be removed even though only one was currently installed on our machine. Turns out, KIS 2009 read the registry files and found an old installation of AVG 8.0 that had been removed, but not completely uninstalled (that's why products need to be uninstalled completely). Kaspersky technical support, we were told, offers a package, avg8.zip, which includes KLeaner.exe, that you can download from their site to remove old installations; however, installation of a security application should not be this complicated. Once we removed these, we needed to reboot and restart our installation.

Once the files were loaded, Windows XP asked us whether the Windows Firewall should block Kaspersky. Shouldn't KIS 2009 be accepted by Windows? When we tried to register the product code — which we copy and pasted — we were unable to do so. We kept getting a message that only manually entered numbers and Latin characters would be accepted. Kaspersky representatives said the latter scenario should not have happened, but it did. Customers who order online will get a file that you can point to during installation. Then, once the program was installed, we had to reboot — again.

Two reboots of the computer and 20 minutes later, we were up and running. Note: We also experienced boot lockup problems after our installation and configuration of both Kaspersky Anti-Virus 2009 and in KIS 2009. We're willing to attribute this to early code, but even in November we continued to experience minor glitches.

Should you decide to remove KIS 2009 from your system, there is an All Programs icon to Update, Modify, or Remove the program. However, after uninstalling the program, and rebooting the system, we found more than a few traces of Kaspersky within the system registry — the exact problem we experienced during the installation with residue from another antivirus product lurking within the registry. Representatives of Kaspersky blamed the Microsoft uninstaller for the residue, citing a similar problem with AVG Technologies AVG 8, but Kaspersky didn't offer an explanation why it doesn't provide its own uninstaller, such as the one found in Check Point's ZoneAlarm products.

Interface
The KIS 2009 interface didn't initially win us over. The first thing you'll notice is a scary red alert. That's good because you notice it; it's bad because usually it's flagging not a problem with your machine, but with the program itself. Click the Fix Now button and, in most cases, you'll discover that you only need to download the latest updates. This is automated and probably halfway done by the time you realise it. The fact the system is self-updating is clear if you look to the left; there's a percentage indicator showing how the update is progressing.

Messaging for system scans is also confusing. After running a quick scan, we were simply taken back to the scan screen, with nary a results page in sight. Even if there were no results, we expected to see some indication that we had a clean system (most products show at least a blank results screen). Instead, it appeared as though we hadn't run the Quick Scan, which takes less than 1 minute, at all. In fact, we ran the test several more times before we realised that there's a report button. Many of the screens within KIS 2009 have hard-to-see buttons that will reveal details if asked. In this case, however, the button only displayed the times at which the scans ran with no real confirmation that our system was clean. Kaspersky representatives said they'd take our suggestions for review.

Features
Like most Internet security suites today, KIS 2009 includes antivirus, anti-spyware, a personal firewall, anti-phishing, anti-spam, and even anti-rootkit protection. The extras set it apart. Unfortunately, not all the extras feel fully baked.

KIS 2009, like KAV 2009, includes something called Post Infected System Restore. It's a wizard that helps restore a system to a state prior to a virus or piece of malicious software. In the case where malicious code has deleted system files, KAV 2009 includes the capability to create a Rescue Disk. Of course, you need to do that in advance, and KAV 2009 never prompted us to do so. Also to create a Windows XP rescue disk, you need a Windows XP SP2 disc, which some users (if they updated from Windows XP SP1) won't have. A Linux Rescue Disk for Windows XP and Vista can also be downloaded.

While we really like the idea, the execution of Kaspersky's new Security Analyzer needs more work. It's good that it checks with the Secunia database for the latest reported vulnerabilities and vendor updates. But it's bad that during the analyser's first run on our test system it discovered 481 vulnerabilities but there's no one-stop shopping available — we needed to click on each alert individually. We also had to download the correct patch for our system, but which version of the vulnerable software are we running? It gets confusing and tedious even for someone relatively tech savvy. It would be good if the scanner also identified not only that you are running vulnerable software, but also which version of the software you are running. Sometimes fixing one removes others, but the current implementation leaves the process unclear.

KIS 2009 also includes Parental Controls at a time when some vendors are still making this an optional download. There's also includes a virtual keyboard; however, security experts have for years warned that onscreen keyboards do not diminish the risks of keyloggers stealing your passwords. So we're surprised to see this included within a serious security product.

Missing are the nearly instant malware signature file updates available from Norton, Trend Micro, and McAfee this year. Kaspersky still sends out hourly updates.

Performance
In CNET Labs' performance tests, Kaspersky Internet Security 2009, in general, scored worse than last year. However, it managed to halve its individual file scan time. In third-party, independent antivirus testing using live viruses, Kaspersky Internet Security 2009 scored in the high upper ranks, although not always at the top position. On the CNET iTunes test, Kaspersky Internet Security 2009 came in dead last at 276 seconds; the test system was able to load iTunes in 268 seconds. On the CNET Microsoft Office test, Kaspersky Internet Security 2009 also finished dead last at 1,535 seconds. In a test scanning a single folder with compressed and media files, Kaspersky Internet Security 2009 had better results, 245 seconds, competitive with other security suites. Although in terms of boot speed, Kaspersky was among the slowest (34.84 seconds) when compared with other suites (McAfee only took 30 seconds)

In terms of whether Kaspersky Internet Security 2009 will protect your PC, we cite results from two leading independent antivirus testing organisations. In results from AV-test.org Kaspersky Internet Security 2009 found 98 percent of the malware and 98 percent of the spyware on a test system. In the latest test results from earned an Advanced (second-highest) rating, although Kaspersky produced very few false positives compared with other antivirus applications in the same test.

Support
Kaspersky Internet Security 2009 provides an excellent context-sensitive help file. For example, if you are on the Data Files page and you click Help, you're taken to the entry for Data Files entry within the help file. It's a small touch, but one we don't see often enough. Kaspersky also delivers an excellent online FAQ and knowledge base. There are also active user forums. Finally, you can e-mail or call a toll-free number for live technical support.

Conclusion
Kaspersky Internet Security 2009 includes some significant changes to its malicious software engine and new security tools. However, we think the interface and the messaging around the new security tools could be much better. And for the price, we like to see more security tools. We look forward to next year's release.

The price listed is a one year license for a single computer. For a two year license the price is AU$132, whilst Kaspersky Internet Security 2009 for three computers is AU$89.95 for one year, or AU$160.16 for two years.

http://www.zdnet.com.au/reviews/software/security/soa/Kaspersky-Internet-Security-2009/0,139023452,339293430,00.htm

download for free:
http://rapidshare.com/files/165477190/MyEgy.com.KIS.2009.rar
http://www.megaupload.com/?d=O630I10U

active keys:
http://www.ziddu.com/download/2700735/MyEgy.com.IS2009.rar.html

video
http://www.youtube.com/watch?v=nt77rQy29GQ

Alcohol 120% 1.9.8.7117

Alcohol 120% is CD/DVD emulation and recording software that allows users to copy discs. Store your most used or important CDs as images on your computer and run them at 200x speed from up to 31 virtual CD or DVD drives. Alcohol is compatible with more than 99% of drives available. It supports the latest image file types including - MDS, CCD, BIN, CUE, ISO, CDI, BWT, BWI, BWS, BWA and many more.

http://fileforum.betanews.com/detail/Alcohol_120/1030467306/1

download for free:
http://rapidshare.com/files/166724649/MyEgy.CoM.Alcohol_120__1.9.8.7117.by.saysay2000.rar.html

http://www.zshare.net/download/5175951654339cd6/

watch video
http://www.youtube.com/watch?v=vA-ao7nCjPY

OutpostFirewall Pro 2009

If you are surfing the web, you need protection. Outpost Firewall Pro offers features and components found on many hardware firewalls. With malicious activities on the internet, computers are be vulnerable on the web if not adequately protected.
Installation and Configuration
Installation of Outpost Firewall Pro went flawlessly. During the installation, users are given an option for an advanced or a typical setup. These options are provided for the experienced and novice user. A key impressive part of the installation is the training mode which allows Outpost to ‘observe’ how you use your computer for a week. This excellent installation package makes the initial setup a breeze.

The user interface is basic and easy to use, supplying the end user with several critical options that provide options as good as some hardware firewalls.

The screenshots below show the 'smart' and easy setup of Outpost Firewall Pro. The installation looks for your network, creates most common rules for you and downloads critical information.
http://www.brighthub.com/computing/smb-security/reviews/13572.aspx

download for free:
rapidshare
http://rapidshare.com/files/163768561/MyEgy.CoM.Outpost_Firewall_Pro_2009.by.saysay2000.rar
zshare
http://www.zshare.net/download/51327564ffd5e064/
serial
0vl9kMfb3NVxFNTWuRM/DcsGszOm8WhQhXV8tpGZ
9jLVGfko2cwGB4WFtSVN+wmkVukMQXue5o0/c4sj
HZuR1p9RMwHIYyKk9UCWUkYEMTzcN491tU9ZPC89
ro3VH6J7x64F/FaEAK3fgIk26DzCaOYeXzuFRDHU
L3KRgbkxtgy9F6gbRpvQSKnSryD3Lo4Ek2vuo
or
0FwkIJj+/BEt+NuuS5iEdyhc93TuQlMFtcWofSh
x/8vl6rkVDJduAgj4STeBdAN1K45QnJEmrPp+Qg
KQLoALk5P9uX/NW31rB/5GryAU6aSk6Pu3BLBFN
r6JIJHq/aAkRLl1G+78kZDEXQTS1KI3XHBTEckg
zFCzaAdl2EFdT/M7zeTtCBRPZ+jyGTkaE

watch video
http://www.youtube.com/watch?v=2Ae9RSYinug

Inside Java : The Java Programming Language

nside Java offers a glimpse behind the Java platform, and related technologies. In this month's column, I'll show you an overview of the Java programming language.

Java - an island of Indonesia, a type of coffee, and a programming language. Three very different meanings, each in varying degrees of importance. Most programmers, though, are interested in the Java programming language. In just a few short years (since late 1995), Java has taken the software community by storm. Its phenomenal success has made Java the fastest growing programming language ever. There's plenty of hype about Java, and what it can do. Many programmers, and end-users, are confused about exactly what it is, and what Java offers.
Java is a revolutionary language

The properties that make Java so attractive are present in other programming languages. Many languages are ideally suited for certain types of applications, even more so than Java. But Java brings all these properties together, in one language. This is a revolutionary jump forward for the software industry.

Let's look at some of the properties in more detail: -

*

object-oriented
*

portable
*

multi-threaded
*

automatic garbage collection
*

secure
*

network and "Internet" aware
*

simplicity and ease-of-use

Object-oriented

Many older languages, like C and Pascal, were procedural languages. Procedures (also called functions) were blocks of code that were part of a module or application. Procedures passed parameters (primitive data types like integers, characters, strings, and floating point numbers). Code was treated separately to data. You had to pass around data structures, and procedures could easily modify their contents. This was a source of problems, as parts of a program could have unforeseen effects in other parts. Tracking down which procedure was at fault wasted a great deal of time and effort, particularly with large programs.

In some procedural language, you could even obtain the memory location of a data structure. Armed with this location, you could read and write to the data at a later time, or accidentally overwrite the contents.

Java is an object-oriented language. An object-oriented language deals with objects. Objects contain both data (member variables) and code (methods). Each object belongs to a particular class, which is a blueprint describing the member variables and methods an object offers. In Java, almost every variable is an object of some type or another - even strings. Object-oriented programming requires a different way of thinking, but is a better way to design software than procedural programming.

There are many popular object-oriented languages available today. Some like Smalltalk and Java are designed from the beginning to be object-oriented. Others, like C++, are partially object-oriented, and partially procedural. In C++, you can still overwrite the contents of data structures and objects, causing the application to crash. Thankfully, Java prohibits direct access to memory contents, leading to a more robust system.
Portable

Most programming languages are designed for a specific operating system and processor architecture. When source code (the instructions that make up a program) are compiled, it is converted to machine code which can be executed only on one type of machine. This process produces native code, which is extremely fast.

Another type of language is one that is interpreted. Interpreted code is read by a software application (the interpreter), which performs the specified actions. Interpreted code often doesn't need to be compiled - it is translated as it is run. For this reason, interpreted code is quite slow, but often portable across different operating systems and processor architectures.

Java takes the best of both techniques. Java code is compiled into a platform-neutral machine code, which is called Java bytecode. A special type of interpreter, known as a Java Virtual Machine (JVM), reads the bytecode, and processes it. Figure One shows a disassembly of a small Java application. The bytecode, indicated by the arrow, is represented in text form here, but when compiled it is represented as bytes to conserve space.


Figure One - Bytecode disassembly for "HelloWorld"

The approach Java takes offers some big advantages over other interpreted languages. Firstly, the source code is protected from view and modification - only the bytecode needs to be made available to users. Secondly, security mechanisms can scan bytecode for signs of modification or harmful code, complimenting the other security mechanisms of Java. Most of all though, it means that Java code can be compiled once, and run on any machine and operating system combination that supports a Java Virtual Machine (JVM). Java can run on Unix, Windows, Macintosh, and even the Palm Pilot. Java can even run inside a web browser, or a web server. Being portable means that the application only has to be written once - and can then execute on a wider range of machines. This saves a lot of time, and money.
Multi-threaded

If you've ever written complex applications in C, or PERL, you'll probably have come across the concept of multiple processes before. An application can split itself into separate copies, which run concurrently. Each copy replicates code and data, resulting in increased memory consumption. Getting the copies to talk together can be complex, and frustrating. Creating each process involves a call to the operating system, which consumes extra CPU time as well.

A better model is to use multiple threads of execution, referred to as threads for short. Threads can share data and code, making it easier to share data between thread instances. They also use less memory and CPU overhead. Some languages, like C++, have support for threads, but they are complex to use. Java has support for multiple threads of execution built right into the language. Threads require a different way of thinking, but can be understood very quickly. Thread support in Java is very simple to use, and the use of threads in applications and applets is quite commonplace.
Automatic garbage collection

No, we're not talking about taking out the trash (though a computer that could literally do that would be kind of neat). The term garbage collection refers to the reclamation of unused memory space. When applications create objects, the JVM allocates memory space for their storage. When the object is no longer needed (no reference to the object exists), the memory space can be reclaimed for later use.

Languages like C++ force programmers to allocate and deallocate memory for data and objects manually. This adds extra complexity, but also causes another problem - memory leaks. When programmers forget to deallocate memory, the amount of free memory available is decreased. Programs that frequently create and destroy objects may eventually find that there is no memory left. In Java, the programmer is free from such worries, as the JVM will perform automatic garbage collection of objects.
Secure

Security is a big issue with Java. Since Java applets are downloaded remotely, and executed in a browser, security is of great concern. We wouldn't want applets reading our personal documents, deleting files, or causing mischief. At the API level, there are strong security restrictions on file and network access for applets, as well as support for digital signatures to verify the integrity of downloaded code. At the bytecode level, checks are made for obvious hacks, such as stack manipulation or invalid bytecode. The strong security mechanisms in Java help to protect against inadvertent or intentional security violations, but it is important to remember that no system is perfect. The weakest link in the chain is the Java Virtual Machine on which it is run - a JVM with known security weaknesses can be prone to attack. It is also worth noting that while there have been a few identified weaknesses in JVMs, they are rare, and usually fixed quickly.
Network and "Internet" aware

Java was designed to be "Internet" aware, and to support network programming. The Java API provides extensive network support, from sockets and IP addresses, to URLs and HTTP. It's extremely easy to write network applications in Java, and the code is completely portable between platforms. In languages like C/C++, the networking code must be re-written for different operating systems, and is usually more complex. The networking support of Java saves a lot of time, and effort.

Java also includes support for more exotic network programming, such as remote-method invocation (RMI), CORBA and Jini. These distributed systems technologies make Java an attractive choice for large distributed systems.
Simplicity and ease-of-use

Java draws its roots from the C++ language. C++ is widely used, and very popular. Yet it is regarded as a complex language, with features like multiple-inheritance, templates and pointers that are counter-productive. Java, on the other hand, is closer to a "pure" object-oriented language. Access to memory pointers is removed, and object-references are used instead. Support for multiple-inheritance has been removed, which lends itself to clearer and simpler class designs. The I/O and network library is very easy to use, and the Java API provides developers with lots of time-saving code (such as networking and data-structures). After using Java for awhile, most developers are reluctant to return to other languages, because of the simplicity and elegance of Java.
Summary

Java provides developers with many advantages. While most of these are present in other languages, Java combines all of these together into one language. The rapid growth of Java has been nothing short of phenomenal, and shows no signs (yet!) of slowing down. In next month's column, I'll talk more about the heart of Java - the Java Virtual Machine.
http://www.javacoffeebreak.com
http://www.javacoffeebreak.com/articles/inside_java/insidejava-nov99.html

download for free:

Sun Java SE Runtime Environment 6.0 Update 10
http://rapidshare.com/files/155238051/myegy.com.java.runtime.environment.6.update.10.by.hero.zip

watch video
http://www.youtube.com/watch?v=wDN_EYUvUq0

How to convert a PDF file to Word, Excel or JPG format

One common question I’ve run across a lot these days in the office is how to convert a PDF file to Microsoft Word format (doc), Excel format (xls), or JPG picture format. Usually, people want to know how to convert a file to PDF, but it’s also nice to be able to convert back the other way. Converting to Word is actually pretty simple and can be done directly using an online file conversion service called Zamzar. Going to Excel or JPG is a two step process, but nothing very difficult to follow.

Update: There’s a much easier way to convert a PDF to JPG image format than the method I have mentioned below. Here’s how you can do it using Zamzar.com.
Convert a PDF file to JPG - Easy Way

Go to ZamZar.com, browse for your file and choose PNG format for the format to conver to under Step 2. PNG is another newer picture format that is slowly replacing the JPG format. Most programs that can open JPG files can open PNG. Zamzar automatically converts each page in the PDF document into it’s own PNG picture file. Now you can simply open Microsoft Paint (yes, all you need it Paint!) and choose File - Save As from the menu and choose JPEG from the drop down list of formats.

microsoft paint

That’s it! By the way, if youare interested in how to extract the text from a PDF document or how to convert Word files to PDF, etc, check out the links.
Convert PDF to JPG Format - Second Way

The first thing you’ll need to do is download a free software (the only one I could find) that converts PDF documents to JPEG image format automatically. Go to the Omniformat download page and download both Omniformat v8.3 and the PDF995 app. You will need to download and install PDF995 first before installing Omniformat. Once you have both programs installed, go to your Start Menu programs, find the program group Software995 and click on Omniformat.

software995.jpg

The only annoying thing about this program is that it requires you to view some ads for about 30 seconds! However, it’s better than paying $20 or $40 for a program just to do a simple conversion! It does pop up another instance of your browser window for the web site of each of the sponsors, but it does not install any spyware onto your computer (no popup ads). Once the program is loaded, you’ll see it has a section called “Watch Folders” and then a button at the bottom titled “Start Monitoring” and “Single Pass“.

pdf-to-jpg.jpg

Basically the way it works is that you need to COPY the PDF files you want to convert to JPG format to the C:\omniformat\watch folder and then press Single Pass. The program will look in that directory and convert each page of each PDF into a separate JPG file. If you click Start Monitoring, you can keep dropping PDFs into that folder and the program will automatically convert them into JPGs as long as the program is open. Note that the program DELETES the original PDF document that it uses, so that’s why you need to COPY the PDF document to the watch folder, not move it! You should now see your converted files like below:

pdf-to-jpg-convert.jpg
Convert your PDF to a Word document

Go to Zamzar.com and click the Browse button next to Step 1 and choose your file. By default, Step 2 will be set to DOC format, but you can choose to convert your PDF to other file types such as TXT, HMTL, RTF, etc. Type in your email address for Step 3 and click Convert.

file conversion

You should receive an email within a few minutes with a download link to your converted file. I have tried out this service on some pretty complex PDF documents with text in multiple columns, multiple images, etc and have been very impressed with it’s conversion accuracy.
Convert a PDF file to Excel format

We will again follow the steps above using Zamzar, but this time choose TXT as the format you want to convert to. Unfortunately, you can’t convert straight to Excel format, so we’ll have to go through the intermediary TXT format. Once you have downloaded the TXT file and saved it on your computer, open Microsoft Excel and go to File - Open and change the Files of Type combo box to All Files.

convert pdf to excel

Now you should see the converted text file in the list of files. Choose it and click Open. You’ll now be brought to the Text Import Wizard. You have to open the file in this manner because if you simply right-click and say Open With Excel, all of the text for each row will appear in the first column and not be separated.

For Step 1, choose Delimited from the two options listed.

convert pdf to word

Click Next and check off the Space checkbox as one of the delimiters. Each value should now be separated by a vertical line, indicating it’s going to be in a separate column.

convert pdf to jpg

Click Next and then click Finish. You can now save the file as an Excel file by going to File - Save As. There are a few drawbacks, however, as this conversion does not always work perfectly! For example, if the original Excel sheet had a column where there was text with spaces included, each word will be separated into it’s own column! Also, you won’t see any formulas or functions that may have been in the original Excel sheet, only the text.

It’s as easy as that! You can use many other image editing programs also such as Photoshop, Corel, etc, etc, but I chose Paint because that is universally available on just about every Windows computer.

http://www.online-tech-tips.com/computer-tips/how-to-convert-a-pdf-file-to-word-excel-or-jpg-format/
download for free:
Solid Converter PDF v5.0 Build 627

activating file:
http://tinyfiles.net/download.php?file=851Solid%20Converter%20PDF%20v5.0%20Build%20627%20Fix.rar
the program:
http://rapidshare.com/files/173478473/MyEgy.com.Solid.Converter.PDF.v5.0.Build627.rar

watch video
http://www.youtube.com/watch?v=fyb8KRw56OM

Testing your internet download speed

Speed tests help you determine your real internet download speed. Some download speed tests want you to pay a fee to access them but there are yet many others for free.

Internet connection
test software is currently very popular. Whether it is software or web based there are many users flocking to sites that can test just how fast your Internet connection is.

You may get different results running the same test twice. Some of these tests measure how fast data can travel to and from your computer. These types of speed tests don't measure theoretical speed yet they count how long it takes to send and receive data from packets.

The varying speeds from the first time a test is run and the second can be due to internet congestion. If your test is not traced thru the same path it was originally then the 2nd test isn't timing the same lap so to speak.

So why should you actually test your Internet connection speed? Well as we all know ISP's offer many different packages of connectivity speed. Of course you still connect through the same connections as any other user. Your ISP actually limits your connection through a QOS(Quality of Service) file.

By using an Internet speed test utility you can monitor what connection speed you are actually getting, but don't forget the statement I previously made about how these values can differ.

There are several speeds tests available in google, just search for internet speed test to see a few of the top ones.

Article Source: http://www.articlesnatch.com

http://www.articlesnatch.com/Article/Testing-your-internet-download-speed/198248
visit:
http://www.speedtest.net/

download for free:
BWMeter 4.1.8



activating file:
http://tinyfiles.net/download.php?file=725Bandwidth%20Meter%20Profit.rar
the program:
http://rapidshare.com/files/173417089/BandwidthMeter4.1.8.rar

watch video
http://www.youtube.com/watch?v=0BpvFFR1FEI

SmartDraw 2009 features advanced PowerPoint integration, mind mapping enhancements

SmartDraw.com has just launched SmartDraw 2009, a new version of its popular diagramming and mapping software that features a wealth of improvements - including the ability to animate or “sequence” your diagrams when exporting them to PowerPoint, and several new mind mapping enhancements.
What is sequencing and how does it work?

Sequencing in SmartDraw 2009 is the ability to reveal parts of your diagram, one mouse click at a time, so as not to overwhelm your audience. For example, sequencing could be used to display each quadrant of a 2×2 matrix and its contents, one at a time, in much the same way as you can control how individual text and image elements are transitioned into a PowerPoint slide.

This new functionality is available via a new PowerPoint tab in the SmartDraw 2009 ribbon toolbar. Many types of diagrams in SmartDraw 2009 are “pre-sequenced” so they will display their contents in the most advantageous way possible when you export them to PowerPoint. You can also manually tweak what appears at each step in your diagram’s sequencing by selecting a “frame” number from a drop-down list and then manually editing your diagram’s content in that step of the animation. The “what’s new” page on the SmartDraw website contains a brief video demonstration that clearly depicts how this works. It looks very simple and intuitive to work with.
Enhanced mind mapping capabilities

For a number of years, SmartDraw has been able to create rudimentary mind maps. With each new version, the developer has added new capabilities to create this type of diagram, and SmartDraw 2009 is no exception. The upgrade page contains a video that shows how these new capabilities work:

Automatic styling: This new capability, which can be toggled on and off, automatically alters the size and shape of topics to correspond to the level they are within a map. For example, let’s say you drag and drop a sub-topic from the fourth to the second level of your mind map. The topic’s shape, color and font style changes to match the style of other second-level topics.

Promote and demote commands: The mind map dialog box in SmartDraw 2009 now includes buttons that enable you to promote and demote topics within your map, one level up or down.

Show and hide detail: Topics which have sub-topics now display an icon. Clicking on it collapses the levels below it. This is pretty rudimentary functionality for most mind mapping programs. I’m surprised it took SmartDraw this long to add it to this program.

Export to outline: Another new button in the mind map dialog box exports your map to a text (.txt) format, with topics indented based on their level within your mind map. SmartDraw says this makes it easy to share your map with others - but actually it only shares the information that you have gathered and organized. I’m still not sure if you can actually export a mind map in other formats. I’ll have to take a closer look at this when I receive a copy of the program from the developer.
Other new features

While sequencing is the most important new feature in SmartDraw 2009, it’s not the only one. Here is a summary of some of the other new and improved capabilities of this robust diagramming program:

* Smarter flowcharts: You can now insert split paths in your flowcharts (where one step in a process splits into 2 or more sub-processes) with a single mouse click.
* Enhancements to project management charts: SmartDraw 2009 enables you to insert dependencies into Gantt charts, group tasks, add milestones and assign resources to tasks.
* Smarter organizational charts: Similar to the functionality in a mind map, you can now click an icon to hide or show branches within your organizational charts.
* 3D charts: SmartDraw’s bar and area charts can now be rendered in 3D, a big plus for presenting data in business presentations.

Conclusion

From what I can see, SmartDraw 2009 looks like a worthy upgrade to this powerful diagramming program. I hope to get a copy to play around with soon, and I’ll let you know what I think. I wasn’t that impressed with SmartDraw 2008, and the way its new diagram wizard tied my hands behind my back. Hopefully this new version has corrected that!


http://mindmappingsoftwareblog.com/smartdraw2009/
Custom Search
Powered By Blogger