Content feed Comments Feed

Mechanical tumor, external heart, elastic cell - CPU Load Meter

Interactive media artist Mio I-zawa’s “mechanical tumor” is a quivering hunk of fleshy, organic-looking material that expands and contracts depending on the amount of stress your computer is experiencing ....
Your Ad Here

Dell Latitude Z: 16-inch notebook weighs 4.5 pounds, charges wirelessly

Dell’s got something for the business set today in the 16-inch Latitude Z, a $2000 notebook that measures just over half an inch thick, weighs 4.5 pounds, and charges wirelessly ....
Your Ad Here

The Very First Lighter Phone SB6309

Although I fully admit to chuckling quite a bit after first seeing this cellphone with a built-in cigarette lighter, I can see some practicality with it. After all, I can’t tell you how many times I’ve heard of my smoking friends losing their lighter. I’ve been asked numerous times if I happen to have a lighter on me, despite that they’re fully aware I don’t smoke. Having a lighter built into your cellphone would come in incredibly handy. After all, your phone is almost always somewhere within reach.....
Your Ad Here

Free Username & Passwords for Paid Sites

Posted by Wonderful-Tricks

Free Username & Passwords for Paid Sites

Ever been into a situation where you click on a link and it asks you to enter a username and password to read the stuff? Lets say you are trying to watch movies online, you searched for sites and found out a link where you can watch movies online. You clicked on the link and it takes you to the site but asks you to login or register to watch the content. What do you do? If you are desperate enough, you might register to that site. Let me save you from that situation., a site where people/you can share your usernames and passwords to any sites that require you to register. whether its, or All you need to do is visit and enter the site that you need login information for. BugMeNot will give you the username and password for that site. Note it down. Go back to the site you were originally trying to access and proceed to login with the username and password you noted in the previous step.

The site also provides disposable email addresses. That means, if you don't want to give your personal email address at places like public listings etc., you can visit and get an email address that you use. I like the idea of sharing username and passwords. If you know or use any username and passwords for sites like movie torrents or music torrents, you can share it @ BugMeNot. : Free Unlimitted File Hosting

Posted by Wonderful-Tricks : Free Unlimitted File Hosting

Do you know is a Free Unlimited File Hosting which gives a commission to their members if their videos, photos or documents are downloaded by others. Why does pay their members? and where does get the budget or money to pay them?

Well, it is very simple to answer you know and here is why????

If we upload more files, it will give more chances for tobe visited by others who want to download their files. When uploading or downloading the files, indirectly we are also their visitors and help to increase the traffic. As we know, if a website has a high traffic, for example; thousand traffics or even million traffics, it will invite the businessmen/advertisers to put an ads in that website (in this case, So, gets the money/budget to pay their member from the advertisements in

How does pay us? You will get $0.001 for every file which is downloaded by others. The commission will be paid through paypal or money bookers when your earning has minimal $ 10.

As well as getting the dollars from the downloaded files, you can also get the dollars through your affiliation or inviting somenone to join We will get $0.10 for one referral. There are many ways to invite our friends to join, such as sending e-mail to your friends (but do not be a spammer…ok), or you can use the most effective way, that is blog.

Website Security Check

Posted by Wonderful-Tricks

Check Out If Your Blog is being Hacked and Exploited

Unmask Parasites is one web based security script that can scan a website for hidden content that might be an indicator that the website was hacked or manipulated by someone else.

It works without registration. All the user needs to do is to enter a url in the search form and let the script do the rest. The script will display a ranking like “This page seems to be clean” listing all the external references - scripts and links - that it founds on that page.

Webmasters can follow those references and let the script analyze them as well or perform additional tests on the website. The two additional tests are the following:

* Finding infected web pages using Google. This is done by using the site parameter in combination with popular spam keywords.
* Display Google’s Safe Browsing rating for the website.

These tests can aid the webmaster in spotting hidden malicious links in a timely manner. It is possible to bookmark the test page and open it again which will initiate a new scan of the website.

Guitar Blogger Template

Posted by Wonderful-Tricks

Free Guitar Blogger Template

For those more musically minded this great little guitar themed blogger template over a green background is a great addition to any blog. This stylish artistic guitar blogger template is a fantastic theme for any blogger who is more musically minded.

You can down load this free guitar themed artistic blogger template Here!

Blogger Template for Christmas

Posted by Wonderful-Tricks

One of the Best Free Blogger Templates for Christmas

This amazing three columned Christmas template is one of the best I have seen for the upcoming festive season. This is one of the best free Christmas blogger templates I have seen, featuring Santa next to a lush green Christmas tree.

As far as blogger templates go this free three columned blogger theme with a snowflake background helps bring people into the Christmas spirit. Its three columned layout and AdSense header space make this a great money making blogger template as well as looking perfect for those christmas bloggers!

This free christmas and santa themed blogger template is available to download free Here!

Crop and Cut Parts from YouTube Videos

Posted by Wonderful-Tricks

Splicd: Crop and Cut Parts from YouTube Videos

Don't have the time or the patience to sit through watching an entire video at Youtube just to get to the 'good' part? Website Splicd let's you edit that video. You decide when the video starts and stops.
Just type the Youtube URL and tell it when to start and stop. That's it.

CheckOut Splicd Here

How does it work?

(1) Determine which part of the video you want to cut.
(2) Copy and paste the URL of the video into Splicd
(3) Enter the start and ending points for the video part that interests you.
(4) Wait until Splicd cuts the video part.
(5) Get a link to share that video part with others.

Display Blogger widgets only in home page

Posted by Wonderful-Tricks

Display Blogger widget only in home page

Usually , widgets in Blogger blogs are displayed in all pages .For eg: , look at the Subscribe for Email Updates: widget on my right side bar . It is displayed in all pages of my blog . Now if you want to display Blogger widget only in home page , you have to edit your Blogger template with the following strip (in blue) of code . Here is HTML2 is my widget id for "Subscribe for Email Updates:".There may be different ids for different widgets .
In each case the following code should be added to make them fixed to the home page .

<b:if cond='data:blog.url == data:blog.homepageUrl'>

<b:widget id='HTML2' locked='false' title='Get Posts By Email' type='HTML'>
<b:includable id='main'>
<b:if cond='data:blog.url == data:blog.homepageUrl'>
<!-- only display title if it's non-empty -->
<b:if cond='data:title != &quot;&quot;'>
<h2 class='title'><data:title/></h2>
<div class='widget-content'>
<b:include name='quickedit'/>

Open your Blogger templates Layout and then Edit HTML
Click on expand widget templates . With Ctrl+F search for each widget with its ids or given label .
Now paste the code as specified and save your template . The edited Blogger widget would appear only in the homepage .

Note :
You can display Blogger widget in all pages except home page by altering above code(in blue) with this one .
<b:if cond='data:blog.pageType == "item"'>

Or you can display a Blogger widget only in a particular post page by changing it with following code .

<b:if cond='data:blog.url == "blog post URL"'>

So ultimately you have the total control over the postion of widgets in Blogger .

Redirecting Users From Old Blog To New Blog

Posted by Wonderful-Tricks

Redirecting Users From Old Blogspot To New Blogspot

Hi Guys , Today I have come with the most Wanted hack named " Redirecting Users From Old Blog To New Blog " . This Hack is very useful for Blogger Users , because in Blogger Bx-Errors may cause your Blogger Blog unavailable for longtime.
But now guys I have found a simple Script through which we can redirect Old Blog users to Our New Blog. In this Post I will tell you How to Implement This Blogger Hack " Redirect Users to New Blog ".
" Redirect users to New Blog Domain " hack is very useful for those who have changed their domains.
For example : If you have a domain named and wanted to change the domain to or any other domains. But you are afraid ,will I get my old Blog users ( to my new Domain.

It's very Simple , just follow the steps below.

Login to your Blogger account and Go to Layout section of your Old Blog . Then navigate to EDIT HTML sub tab and search this text </head> .

Now Copy and paste the following Code Below or Above that.

alert('Sorry For the trouble guys , I have moved my Blog to . So you will be redirected to my New Blog in few seconds');

window.location.href = '';

The text in Red will appear in the Alert Box ( Edit it to your Wish ).

The Text in Blue is the destination Url . ( place your new Blog Url )

Now When users go to your old Blog they Will get this Alert Message,and they will be redirected to your New Domain in a few seconds.

Adding meta tag in Blogger

Posted by Wonderful-Tricks

Add meta tag in Blogger

Meta tags are Simple HTML codes that can describe various factors of your site to the search engine spiders .These factors include web page title ,Description,keywords , language and many others . Though many blogs says that the meta tags don't have any value now , i strongly believe that they can affect SERPS in Yahoo and MSN . In this case i will help you to add meta tag in a Blogger blog.

Go to your Blogger template Layout and Edit HTML .

Fill the following example meta tag with your details

<meta name="Title" content="Your blog title" />
<meta name="Description" content="this is the description of your Blogger blog" />
<meta name="Keywords" content="Your keywords separated by comma" />
<meta name="Author" content="Author Name" />
<meta name="Language" content="Language of Website" />
<meta name="Copyright" content="© Copyright information" />
<meta name="Revisit-After" content="1 Days" />
<meta name="Robots" content="All" />

Now we are about to add meta tag in Blogger

Find out the <head> tag and paste your details exactly after that selection.

PN: Keywords in meta tag can help you to bring targeted adsense ads into your blog.

Snow fall widget in Blogger

Posted by Wonderful-Tricks

Snow flakes widget in Blogger

Christmas is on its way and many Bloggers are changing their templates and widgets to welcome this season . At techknowl , i have numerous changes as you can see in my logo and template design . I have added snow flakes in my template and i will help you to add a similar one in your template .

Go to your Blogger template's Layout and open Edit HTML .

Now search for </style> tag and place this code just after that ,

<script src="" type="text/javascript"></script>

Save and preview the changes .

You can customize the number,color and speed of the snow flakes by changing the JavaScript used with the above code .

var num = 60; //controls the number of flakesvar
timer = 20;//controls the speed of flakes

Download it here and edit using notepad and re-upload to any file uploading service that support hotlinking of JavaScript files.

Note: Remember to change the URL in bold with your new edited javascript link .

Wish you a happy Christmas and prosperous New year .

Creating favicon for your Blog

Posted by Wonderful-Tricks

Creating favicon for your Blog

Have you noticed the animated W icon on this site ??? .Theses icons are called favicons and are present on the extreme left of the URL bar of your browser . Here you can see a screen shot of the Google's "g" favicon that i took from Mozilla Firefox.

Similar to desktop icons these favicons represent each websites & it is the short code for favorites icon . But as far as blogger blogs are concerned, they are having a default favicon built onto them . The following procedure will explain how to change the default blogger favicon with yours . Remember to check the blogger terms and conditions before you change the favicon

  • Go to the Layout and select edit HTML

  • Create a back up copy of your blog by clicking download full template.

  • Now find out following lines code. ( Don't worry if you are not able to find them out just press cntrl+f then search for <head>)

    <head><b:include data='blog' name='all-head-content'/>

  • Next step is to create your own favicon ,for that you may use any image and that to be converted into .ico extension . But remember to make it small, sharp and square shaped so that it is visible .

    To Create Favicon U can use the below sites:
    Visit Dynamic drive
    Visit Animatedfavicon

  • Once it is created, upload it to any photo sharing website like or any hosts supporting icon files.

  • In between second and third line of the code shown above , add below code with necessary editing or just add below <head>

    <link href='Icon URL' rel='shortcut icon'/>

  • Replace Icon URL with your .ico file ( May be like this

    Now save the template & you are done.

Please Make Note:
Don't know how to create an .ico file from your image file?? Well that's pretty easy
Go to Visit IconJ and upload your image files there(jpg,bmp,gif are allowed) . Now they will host it and give you a direct link of the image converted as an icon.

As shown in above steps , replace the Icon url with the link you are getting.

Feel free to leave comments.

Missed call alert for your Mobile

Posted by Wonderful-Tricks

Missed call alert for your Mobile


Go to Call Settings then select call diverts when u r unreacheble..
Select to other number
Then type this number : +919824001711
Thats it

Due to this setting UR call will be diverted when u r unrecheble to the given nmber and this server number wil send sms to your cell phone by displaying your Missed call

Activate Free Missed call alert on your Airtel Number

I am goin to post a trick by using this trick you can activate the Free Miss call alerts on your Phone. For this you have to just dial a number and it cost you nothing. Without paying a single paisa you can subscribe to Miss call alert service by Airtel.
This service will notify the number of missed calls and also display the name of caller if the number was stored in the address book.

What is "Miss Call Alerts" ??

When your phone is Switch Off or Out of Reach :
You will be notified via SMS when you will switch on your phone or you get back your network. To avail follow the instructions given below-

To activate dial : *62*675# and press call button.
To deactivate dial : #62# and press call button.

It will also notify the subscribers through SMS about all the calls made to them when their mobile phone was switched off or out of the coverage area. This service will work when the customer was not available to take calls. As soon as the mobile phone was available to take calls the customer will receive SMS from Airtel, which will contain details of the last ten missed calls.


Just dial **62*+91560# and get free miss call alert 4 lifetime..,

Just dial **62*+91675# and get free miss call alert 4 lifetime..,

Just dial **62*+919894035100# and get free miss call alert 4 lifetime..,

Just dial **62*+91569# and get free miss call alert 4 lifetime..,

Just dial **62*+91564# and get free miss call alert 4 lifetime..,

Just dial **62*+919824001711# and get free miss call alert 4 lifetime..,

NOTE :-if u r not able to uses this diverting code than remove +91 or +.....NJOY

Download Torrent Files Without Using Torrent Client

How To Download?
All you have to do is go to BitLet.Org.
First of all, copy the torrent metafile URL and paste it at BitLet.Org then press "Download Torrent". Done !!
You're now downloading torrent files without using torrent client.
GO tell your friend about this magic.

Note:You must have Java Plug-in in your browser..

Find out if your email has been read!

SpyPig is a free email tracking system which can send you a notification when your friends read your email. This special tracking system works with any web-based email program.

If you are using email client such as Microsoft Outlook with Microsoft Exchange Server, You can easily get notfied when your recipients read your email, but it is impossible for web-based email application such as Yahoo Mail, Gmail, or Live Mail to implement this feature.

SpyPig provide users a special image which include a tracking code. Users can then insert this tracking image in their email message, and they will get notified when others read the email.

To use SpyPig, simply provide them your email address, then type your message title (this is for better tracking so that you can know which email has been read). You can then choose your SpyPig image (if you don’t want your recipients know you are tracking the email, choose a blank image). After that, you can paste the tracking image on your email message and then send out the email. Currently, they limit the number of notification emails to 5 for each tracking code, which means you will only get 5 notifications even there are 10 people read your email.
SpyPig works fine with all email applications, both desktop clients and web-based email. But, you need to change some settings on your Microsoft Outlook in order for SpyPig to work.
You can check it out here.

Note: Both you and your recipients must use HTML-format email so that they will download the tracking image when they open the email.

Ultimate Flash Face

Posted by Wonderful-Tricks

Ultimate Flash Face - Draw Face Sketches Online

Ultimate Flash Face is a web-based drawing application on the character description method used by the police and security services. It enable you to sketch a face online. This website gives you a chance to sketch a face and display your masterpiece even though you are neither a fine arts.

There are more than 1000 facial elements for male and female. It is very easy to sketch a face, just drag-n-drop facial elements such as hair, head, eyes, eye brown, lips, nose, jaw into the canvas, then adjust the size, opacity and angle. You can save the face sketch online, share it with friends over email or print it with your local printer.

What are you waiting for, click on and try sketch a face of your friends, colleague or celebrities.

Mango Languages

Posted by Wonderful-Tricks

Learn 12 different Languages in a Fun Way

Mango Languages offers eleven hundred lessons and eleven courses of foreign language instruction for the “amazing price…Free!” Lessons are in about a dozen different languages, including: Spanish, French, Italian, Brazilian Portuguese, German, Greek, Russian, Japanese, Mandarin Chinese, and English for Polish and Spanish speakers.

The site is well organized and easy to use. A top navigation bar offers access to the main areas of the site. Registration is required to use the lessons but it is free to anyone with an Internet connection.

Need to brush up on your French or Spanish or any of eleven other languages? Mango is the place to go to learn foreign language at your own pace and in a fun and engaging way. Teachers and students can use this site to easily add practice to the curriculum or the general public can use it to sharpen their mind by learning a new language. Users can listen to the phrases and words spoken by a native speaker and the words are color coded for translation. Each sentence is preceded by an icon for replaying and each word can be scrolled to see the phonetic pronunciation. The lessons include grammatical and cultural notes that provide insight into the language and customs as well as quizzes and conversations that focus on practical experiences. The slides can be replayed as many times as necessary to learn and reinforce the content. Additionally, a forum is available for users to learn more about Mango and to discuss the languages they are learning.


Posted by Wonderful-Tricks

Unblock sites and Bypass Firewall in your Office

Can't surf your favorite sites such as mySpace at school or office? Employer blocked most wanted sites? Sad but true and they have full control over their firewall and can block anything.

OffSurf safely bypass firewall restrictions at work, university, school: it doesn't only unblock, but also obscures and encrypts URLs being visited, and nobody will be able to track which web sites you are visiting.OffSurf is a Firewall Bypass Service which lets you surf the web privately and securely. Just enter a URL (web site address, e.g. or in the box below and hit Navigate!

Visit OffSurf Now.

Vectorize a picture

Posted by Wonderful-Tricks

Vectorize a picture

Textorizer - Vectorise a picture using text strings. To use the cool textorizer generator, simply point to an image on the web, enter the text to add, set some size and effect controls and then Textorize! Neat effect.
The image shown is done using firefox image

Practice Your Typing Skills and Speed online is a simple online touch type practice tool to improve your keyboarding skills. It has been my favorite online touch typing practice tool for a long time now. Not only does it help you improve on your typing speed but it also lets you learn to type without looking at the keyboard. This is one important feature that is not usually present in other online typing excercises.

Once you enter the site you are presented with a keyboard and a phrase to write. The phrase has words along with scrambled words which you must type. The key that is next is highlighted in green and the keys which you miss are highlighted in pink so you can record which keys give you trouble. There are also levels which you can choose from so you can continue to challenge yourself.

Visit Now!

Access your GMail address book from your desktop

iContact is a free software tool for Windows that allows you to access your GMail address book from your desktop. You can find your contacts very quickly without the need to login to your GMail/Google Apps account everytime.
iContact uses Gmail/Google Apps contacts list as the central repository for your contacts. You can still see and edit your contacts in Google but iContact allows you to have instant access to your contacts whenever you need them without loging into your Google/Gmail account. As well as that you can enjoy iContact's integration with other applications like your email client, Skype and Goolge Maps (and for example send contact's address to your Satnav system).

Multiple computers, one set of contacts

If you have more than one PC, iContact will allow you too see your contacts on all computers without the need to synchronize them.

Local tools integration

iContact is connected to different tools on your desktop: You can start your email program by clicking on ther email address, call them with Skype or find their address on Google Maps and send it to your Garmin or TomTom navigator.

Main features

Gmail and Google Apps compatible
Online access to contacts (two-ways: Read and Write)
Fuzzy search: Kathryn, Katherine, Catharine, Kathryn or...? Find all of them!
Find contact address on Google Maps - Send it to your SatNav from there
Intelligent phone number correction
Large text display of phone numbers
Starts with Windows if you want and connects to your Google account

Download Now!

Send an Email without an Email account

Posted by Wonderful-Tricks

Send an Email without an Email account with Note2email

When browsing the Internet from an untrusted network or an office computer it can be unsafe to type in the email account password. This tool was designed to help users send themselves email notes without logging in to their email account. For more security the user has the option to encrypt the content of the message and the encryption key is stored nowhere.

Note2email is a web application designed to send quick text notes to any email address in the world that send quick notes to your email address in one easy step, no need for passwords or usernames.

In addition to this the service also allows you to can use the service on a public terminal to send yourself an important note or a todo message without logging into any of your email accounts.The service allows you to send unlimited email messages, but limits abuse by sending one message at a time.

Click here to try.

Removing Label number count in Blogger

Posted by Wonderful-Tricks

How To remove Label number count in Blogger

By default, the Labels will have an automatic count of the number of posts. You can remove those counts. To remove label counts in blogger, just follow the step by step instructions below.

  • Before you do anything to your templates, please backup your template first.

    Login to your dashboard, go to Layout -> Edit HTML and Click Download Full Template

  • After you have found the code above, scroll down until you find this code (<data:label.count/>)
    and delete it.

  • Preview your template, after you satisfied, save your template.

Check your Blog loading speed with WebWait

Posted by Wonderful-Tricks

Check your Blog loading speed with WebWait is a web based tool which helps you benchmark your website and your web connection.
Webwait works by placing your site inside an IFrame embedded on the Webwait website.
Webwait claims that the web timing is accurate because it pulls down the entire website into your browser, so it takes into account Ajax/Javascript processing and image loading which other tools may ignore. helps you measure the speed of your websites. Webwait calculates precisely how long the website takes to load and render in your client browser, including any images, stylesheets, and Javascript, with your internet connection.

Webwait respects your cookies and authentication, so you can test websites with login information also. To test secure sites that require login, visit that site first and log in. This will set up your authentication cookies. Then you’ll be able to open it up in Webwait with your login credentials.

You can even use the Webwait to access servers running on your machine or behind the firewall in the your LAN.

With Webwait, the website timing is dependent on your own internet setup and local setup. You can have your friends test your website from other parts of the world using their computer and internet connection and compare.

When testing your website, close all other programs including instant messengers, and just run only one browser window used for the testing. Also make sure that there are no major operating system delays, such as hard drive swapping, which would affect the browser’s performance.

Gender Analyzer: did a man or woman write that blog?

The folks who developed Gender Analyzer say We created Genderanalyzer out of curiosity and fun. It uses Artificial Intelligence to determine if a homepage is written by a man or woman. Behind the scene, a text classifier hosted over at has been trained on blogs written by men and women. In our lab it seems to works pretty well, we want to see how it performs on the web! We hope you like it!

Visit Gender Analyzer

How to add "Print Button" after every post in Blogspot

Now you can install print button in your blog like those in popular websites. Print button is a button to help readers to print articles with just a click. To install just follow in the instructions below.

This is a step by step instructions on How to add "Print Button" after every post in Blogspot. Just follow the steps properly.

Before you do anything to you template, you need to backup your template first.

To do this, go to Dashboard -> Layout -> Edit HTML and Download Full Template.

Once you backup you template, Go to Edit HTML and tick Expand Widget Templates.

Step 1:

Find <p><data:post.body/></p>

Step 2:

Choose your buttons and replace <p><data:post.body/></p> to the codes given below.

Few Buttons Available:

<!-- Print code by -->
<span class='noprint'><data:post.body/></span>
<b:if cond='data:blog.pageType == &quot;item&quot;'>
<a href='javascript:window.print()'><img src=''/></a></b:if>
<!-- Print code by -->

<!-- Print code by -->
<span class='noprint'><data:post.body/></span>
<b:if cond='data:blog.pageType == &quot;item&quot;'>
<a href='javascript:window.print()'><img src=''/></a></b:if>
<!-- Print code by -->

<!-- Print code by -->
<span class='noprint'><data:post.body/></span>
<b:if cond='data:blog.pageType == &quot;item&quot;'>
<a href='javascript:window.print()'><img src=''/></a></b:if>
<!-- Print code by -->

<!-- Print code by -->
<span class='noprint'><data:post.body/></span>
<b:if cond='data:blog.pageType == &quot;item&quot;'>
<a href='javascript:window.print()'><img src=''/></a></b:if>
<!-- Print code by -->

<!-- Print code by -->
<span class='noprint'><data:post.body/></span>
<b:if cond='data:blog.pageType == &quot;item&quot;'>
<a href='javascript:window.print()'><img src=''/></a></b:if>
<!-- Print code by -->

<!-- Print code by -->
<span class='noprint'><data:post.body/></span>
<b:if cond='data:blog.pageType == &quot;item&quot;'>
<a href='javascript:window.print()'><img src=''/></a></b:if>
<!-- Print code by -->

<!-- Print code by -->
<span class='noprint'><data:post.body/></span>
<b:if cond='data:blog.pageType == &quot;item&quot;'>
<a href='javascript:window.print()'><img src=''/></a></b:if>
<!-- Print code by -->

<!-- Print code by -->
<span class='noprint'><data:post.body/></span>
<b:if cond='data:blog.pageType == &quot;item&quot;'>
<a href='javascript:window.print()'><img src=''/></a></b:if>
<!-- Print code by -->

If you want to add the buttons after the title.
Replace <p><data:post.body/></p> to the codes given below.

<!-- Print code by -->
<b:if cond='data:blog.pageType == &quot;item&quot;'>
<a href='javascript:window.print()'><img src=''/></a></b:if>
<span class='noprint'><data:post.body/></span>
<!-- Print code by -->


Posted by Wonderful-Tricks

MOTOYUVA W396 Multimedia Handset Phone launched by Motorola

The MOTOYUVA W396 incorporates a quality VGA camera with 4x zoom and auto-save option for quick sharing with friends via MMS. Loaded with many features like blocking that enables user to select on call to receive and voice call being a totally new experience for users.

The MOTOYUVA W396 comes with FM radio and an optional removable micro SDTM card with up to 2 GB expandable memory. It offers a storage capacity of 1,000 contacts and 750 SMS.The MOTOYUVA W396 has a 128x160 65,000pixel TFT display and comes with a VGA camera with 4x zoom.MOTOYUVA W396 phone can be used even without inserting a SIM SIM card. There is no need to search for a SIM card to use the camera, MP3 player, or FM radio.

It offers latest version MP3 player software that enhances users benefits including play list creation and to organize songs by genre, artist or album. The phone also features ability to record excerpts of songs from FM radio along with radio data system (RDS) functionality, which shows the name of the artist, the song and the genre of music playing. Wherein setting the FM alarm, users can listen to FM radio via stereo earphones or the speaker phone.

Motoyuva W396 Review :
“The sleek and stylish MOTOYUVA W396 makes a powerful statement with a youthful and vibrant design and fulfills the needs of every aspiring Indian youth,” mentioned Faisal Siddiqui, director of Product and Solutions, India and Southwest Asia, Motorola Mobile Devices.

This fully-loaded handset doesn’t need a SIM card to use the camera, MP3 player, or FM radio features thus delivering a fun and engaging experience in an elegant, compact package. The MOTOYUVA W396 is now available in India at all MOTOSTOREs and retailers at an exciting price of Rs 4,199 (MRP: Rs 4,424).

The new exciting mirror-like clamshell phone which is specially designed for the Indian youth is a stylish, affordable mobile music phone with multimedia features and a cool green rim.

Motoyuva W396 Features :
The MOTOYUVA W396 incorporates a quality VGA camera with 4x zoom and auto-save option for quick sharing with friends via MMS. Loaded with many features like ...

2 GB expandable memory.
1,000 contacts and 750 SMSs
128x160 65,000pixel TFT display
VGA camera with 4x zoom.

Motoyuva W396 Price: Rs.4424 -Rs. 4199.

Motorola AURA

Posted by Wonderful-Tricks

Motorola AURA swivels onto the scene

Way back in October, Motorola had unveiled its luxurious AURA handset, the company has now announced the pricing and availability details of the handset.

Motorola AURA mobile phone is available for purchase exclusively at Motorola USA’s webstore for a whopping $2,000 (approx. Rs. 96,960).

The main attribute of the handset is the looks. The unique attracts design of handset comprises of its 62-carat, Grade 1 sapphire crystal lens that covers the world’s first circular display, front plate swivels open, three tungsten carbon carbide-coated main gears and 130 precision ball bearings.

Specifications for the Motorola Aura

Band GSM 850/900/1800/1900MHz
Size 96.9mm x 47.6mm x 18.6mm (3.8" x 1.9" x .7")
Weight 141g (5oz)
Battery 810mAh
Battery Life Estimated 16.5 days standby time
Estimated 7 hours talk time
Main Display 1.5" diameter 16m color round TFT
Camera 2 megapixel
Video Record/Playback
Messaging SMS/MMS/IM
Email POP3/IMAP and Web-based
Bluetooth 2.0 + EDR with A2DP
Memory 2GB internal
Availability Planned Q4 2008
Other Speakerphone, Sapphire crystal lens

Samsung Ego GT-S9402 Dual Sim Card

Posted by Wonderful-Tricks

Samsung Ego GT-S9402 Dual Sim Card

If you need another dual sim phone card, I think you should look at Samsung Ego the latest handset in Samsung DuoS range. Come with 2 inch QVGA OLED display, Samsung GT-S9402 Ego have 5 megapixel camera.
The Samsung Ego is a duel SIM card phone and is aimed at the luxury mobile phone market, well as €1200 it would want to be. SO what do you get for your money?

The body of S9402 Samsung Ego phone is made from “liquidmetal” composite alloy developed by Caltech, which is “3 times stronger, can withstand 1.8 times the pressure, is 1.6 time more flexible, has 3 times better vibration absorption and 100% lower thermal conductivity then titanium“.

Samsung have already been in the luxury phone market in partnership with Bang & Olufsen but that wasn’t too successful.

The Ego is now available in Russia.

Samsung Ego S9402 specs include:

  • Triband GSM (900/1800/1900 Mhz), GPRS/EDGE connectivity on 1st SIM card
  • Dual band (900/1800 Mhz), GPRS/EDGE connectivity on 2nd SIM card
  • 2? 262K color QVGA AMOLED display
  • 5 mpx camera with autofocus, image stabilization, smile detection, WDR and LED flash
  • FM Radio with RDS
  • 1 GB of built-in memory
  • microSDHC memory card slot (up to 8 GB)
  • Bluetooth 2.0 and USB
  • 960 mAh battery
  • Dimensions: 115 x 48 x 16 mm
  • Weight: 140 g

Google Launches Unlocked Android Dev Phone

Posted by Wonderful-Tricks

Google Launches Unlocked Android Dev Phone

Google launched today the Android Dev Phone 1 for developers that wish to field test applications on actual hardware without relying on the SDK emulator or access to T-Mobile service.It is a unlocked as far as the SIM card and hardware features, meaning you can use it with any carrier supporting GSM.The phone fits with the standard HTC style designs, however it comes with a neat fractal graphic on the back and includes a three mega-pixel camera, Wi-Fi, GPS, Quad-band GSM and EDGE for input access.

All that is required in order to purchase the device is a $25 application fee for the Android Marketplace along with registration information, and the device can be purchased directly from Google for $399.99 with a strict limit of one per individual or organization.

A total of 18 countries including the US, UK, Germany, Japan, India, Canada, France, Taiwan, Spain, Australia, Singapore, Switzerland, Netherlands, Austria, Sweden, Finland, Poland, and Hungary will receive access to the hardware with future expansion planned to other countries down the line.

Sony Ericsson’s Walkman phone Xmini

Posted by Wonderful-Tricks

Sony Ericsson’s Walkman phone Xmini for Japan

The cute little device you’re looking at here is more than just a perfectly acceptable Walkman,– it’s a Walkman phone.The Sony Ericsson Xmini has been added to KDDI au’s CDMA-based lineup.The Xmini slider measures just 44 x 75 x 18mm, and has a touch-sensitive control surface that lights up with music transport buttons when the phone is closed.

New Slide phone features 1.8-Inch LCD screen with a QVGA resolution (240×320), 4GB of built-in Memory,and touch sensor and is compatible with the au BOX allowing you to enjoy music and video content downloaded via your TV sets on your ‘au’ mobile phones.It’s far from being a Japan-only ultimate handset with 8 megapixel camera .

The Sony Ericsson Xmini will be available in Japan at the end of December; unfortunately Walkman Phone Xmini will be sold only in Japan.

Trimble Juno SB and Juno SC rugged phones

Posted by Wonderful-Tricks

Trimble intros Juno SB and Juno SC rugged phones

Trimble has now unveiled two new rugged mobile phones with integrated Global Positioning System (GPS) technology in their Juno series—the new Trimble Juno SB and Juno SC handhelds. (The average mobile phone user may not have heard of Trimble, but it is well known within the construction business.)Both units also feature WiFi, Bluetooth, a 3-megapixel camera, 533MHz processor, 128MB of onboard memory, microSDHC slot, 3.5-inch display and a battery good for at least a day of toiling.

The Juno SC however offers 3.5G data support.The pair run on Windows Mobile 6.1 operating system on a 533MHz processor, and are available as of now, but as yet no pricing for either has been announced.

Wal-Mart to sell 4GB iPhone for $99

Posted by Wonderful-Tricks

Wal-Mart to sell 4GB iPhone for $99

Wal-Mart Stores will sell Apple popular iPhone later this month, according to store employees and various media reports.There will be a 4GB model priced at $99 with a 2-year agreement.The iPhone went on sale starting July 11 at $199 for the model with 8 gigabytes of storage and $299 for the 16-gigabyte version.

However, iPhone users need to sign up with data service provider AT&T Inc for a plan that costs at least $30 a month for unlimited Web access and another $5 for 200 text messages or $20 for unlimited texting. Wal-Mart has been gaining market share and clout in the recession as cash-strapped shoppers seek out its low prices. Neither Apple nor Wal-Mart were immediately available to comment.

Personalized Animated Wallpapers

Posted by Wonderful-Tricks

Visit Reddodo
Free personalized animated wallpapers and screensavers for mobile phones. Create unique cell phone wallpaper with your text on it.
Personalized Mobile Screensavers & Wallpapers
Create animated cell phone wallpaper with your text on it. Quick. Easy. Absolutely free.
With Red Dodo's screensaver generator you can make your own unique mobile screensaver / animated wallpaper and download it to your cell phone for free.

Rename Several Files at Once

Posted by Wonderful-Tricks

Rename Several Files at Once

If you want to give new names to a group of files that share a common theme — such as a collection of digital photos taken during a vacation — you can save yourself time and finger cramps by renaming them all at once (known as a “batch rename”). Follow these steps:

A batch rename can be done in only one folder at a time. Also, be careful not to accidentally rename any critical system files. Doing so could cause Windows to malfunction.

1. Select the files you want to rename using one of the following methods:

• Simultaneously press the Ctrl key and the A key to select all of the files in a folder.

• Click the first item in a list, and then hold down the Shift key and click the last item in the list. This causes the first and last items and any between them to be highlighted.

• Hold down the Ctrl key on your keyboard while clicking each individual item you want to select.

2. Right-click the file you want to go first in the newly renamed series.

3. Select Rename.

4. Type a name for the first file in the series, and then press the Enter key.

5. All of your selected files are given this new name, followed by a number that distinguishes them from one another. For example, if you renamed the first file LoneRanger, then the rest of the files would be named LoneRanger 1, LoneRanger 2, LoneRanger 3, and so on.

6. If you are unhappy with the new names, you can restore the original ones by simultaneously pressing the Ctrl and Z keys on your keyboard. Each time you use this keyboard shortcut, only one file reverts to its original name. That means you must use this shortcut numerous times to restore all of the names.

Turn on the Address Bar

Posted by Wonderful-Tricks

Turn on the Address Bar

A great way to zip back and forth between your hard drives, CD/DVD drives,
and important folders like My Documents is to use the Address Bar. If you
haven’t turned on this feature, here’s how:

Note: Any changes you make to the Address Bar will be applied to all of your folders.

1. Double-click any folder to open it.

2. Click the View drop-down menu.

3. Select Toolbars.

4. Select Address Bar.

5. The Address Bar appears near the top of your folder. To move quickly
from your current folder to a different location on your computer — such as My Documents or your CD or DVD drive — click the drop- down menu on the Address Bar and select the name of your desired destination.

Turn on the Status Bar

Posted by Wonderful-Tricks

Turn on the Status Bar

The Status Bar is a feature of Windows that provides extra details about the files
or folders you are viewing It also comes in handy when you’re using Internet Explorer, because it enables you to roll your mouse cursor over a hyperlink and see the actual Web address for that link.

Note: Any changes you make to the Status Bar will be applied to all of your folders.

Follow these steps to display the Status Bar on Windows XP:

1. Double-click any folder to open it.

2. Click the View drop-down menu.

3. Click Status Bar.

4. The status bar will appear at the bottom of your folder.

Follow these steps to display the Status Bar in Internet Explorer:
1. Open Internet Explorer.

2. Click the View drop-down menu.

3. Select Status Bar.

Enhance Your Folders

Posted by Wonderful-Tricks

Enhance Your Folders

Instead of wasting time clicking through one drop-down menu after another until you find the Windows feature you want, you can make your folders more user friendly by adding shortcuts to commonly used commands. Follow these steps:

Note: Any changes you make will be applied to all of your folders.

1. Double-click any folder to open it.

2. Click the View drop-down menu.

3. Select Toolbars.

4. Select Customize.

5. The Customize Toolbar window opens. In the left window pane, under the Available Toolbar Buttons heading, scroll down and click Cut.

6. In the middle of the window, click the Add button.

7. The Cut icon will appear in the Current Toolbar Buttons window pane on the right. To change its position in your folders’ toolbars, click the Move Up or Move Down button. Each time you click one of these buttons, the icon moves one space up the list or one space down the list.
The higher you place the icon, the farther to the left it will appear in your folders’ toolbars. The lower you place the icon, the farther to the right it will appear in your folders’ toolbars.

8. Repeat this procedure for the Copy, Paste, and Delete icons, and for any other options you want to add to your folders’ toolbars.

9. If you change your mind and want to delete an icon from the list, select it, and then click the Remove button.

10. To separate the icons from one another or to arrange them in groups,
you can add thin vertical lines known as separators. Here’s how:
a. Under the Available Toolbar Buttons heading, click the Separator icon.
b. Add it to the right window pane in the same way you added the other icons.
c. Change the separator’s position by clicking the Move Up or Move Down button.
d. To add more separators, repeat this process until the toolbar is organized to your liking.

11. To help you identify the icons, you can place names next to them. Click the drop-down menu labeled Text Options.
a. If you want all of the icons to have names, select Show Text Labels.
b. If you want just the important icons to have names, select Selective Text on Right.
c. If you do not want any names to be displayed, select No Text Labels.

12. When you are finished customizing the toolbar, click the Close button.

Organize Your Bookmarks

Posted by Wonderful-Tricks

Organize Your Bookmarks

If you use the Internet on a regular basis, you probably have accumulated a
large collection of miscellaneous bookmarks. To avoid the hassle of scouring
your entire collection to find one specific bookmark — which could make finding a needle in a haystack seem easy — you can separate and organize them with a few simple techniques:

1. Double-click the My Computer icon on your desktop.

2. A window opens. Double-click the icon for your C: drive

3. Double-click the Documents and Settings folder.

4. Double-click the folder containing the name of your Windows account. For example, if your account is named Bob, then double-click the Bob folder.

5. Double-click the Favorites folder, which contains your bookmarks.

6. Some bookmarks have long names that are difficult to read. To give a
bookmark a shorter name, right-click it, select Rename, and then type a new name.

7. To make it easier to find a particular bookmark while surfing the Internet, you can organize your bookmarks into separate folders with easily identifiable names as follows:
a. Click the File drop-down menu located in the upper-left corner
of the Favorites folder.
b. Select New.
c. Select Folder.
d. A New Folder appears. Type a name for it that indicates what kind of bookmarks it will contain. For example, you could call the folder Shopping and use it to store all of the bookmarks to your favorite Internet stores.
e. Repeat this process until you have created enough unique folders to store your different types of bookmarks.
f. If you change your mind and want to give a folder a different name, right-click it, select Rename, and then type a new name.

8. Now you can begin to move your bookmarks into the folders you created:
a. To move a single bookmark, click it, and then drag-and-drop it onto a folder.
b. To move several bookmarks at once, hold down the Ctrl key while clicking the names of each bookmark. Once all relevant bookmarks are highlighted, drag-and-drop them onto a folder.

Hide the List of Recent Documents

Posted by Wonderful-Tricks

Hide the List of Recent Documents

Each time you open a document or file, Windows creates a shortcut to it that is placed in a list called Recent Documents. The purpose of this list is to give you a simple way to access your recently viewed documents without having to waste time searching for them. However, there is a downside: anyone who uses your computer — or hacks into it — can view this list to find out what documents you recently opened. To enhance your privacy and security, you can hide the Recent Documents list.

Follow these steps:
1. Click the Start button in the lower-left corner of Windows.

2. Click the Control Panel. (If you don’t see this option, your Start menu is in classic mode. In that case, click Settings, and then select the Control Panel.)

3. If the Control Panel is in category view, click the Appearance and Themes category, and then click the Taskbar and Start Menu icon. If the Control Panel is in classic view, simply double-click the Taskbar and Start Menu icon.

4. A window opens. Click the Start Menu tab.

5. Click the Customize button.

6. Another window opens. Click the Advanced tab.

7. Remove the checkmark from the List My Most Recently Opened Documents box.

8. Click the Clear List button.

9. Click the OK button.

10.You are returned to the previous window. Click the Apply button.

11.Click the OK button.

Can’t Think of a Status? Try Generatus

Posted by Wonderful-Tricks

Stuck for a Status? Try Generatus

If you can't come up with a witty status message for yur Facebook account, try today's Simply type your name, select your gender, and hit Generate to produce a series of messages to use on your social networking page!

Avoid Certain Passwords

Posted by Wonderful-Tricks

Avoid Certain Passwords

Because many people have a difficult time remembering their passwords, they often use names or words that are near and dear to them — like a pet’s name.

Although such passwords are easy to remember, they also are easy for a criminal to crack. Never use passwords containing the following:

• Nicknames for you or your family members

• A pet’s name

• Your mother’s maiden name

• The street number or street name of your current or former residences

• Your relatives’ names

• Sequential numbers (like 1234 or 6789)

• Common words (like the word password or the)

• Words directly related to your occupation (for example, if you are a doctor, don’t use doctor)

Create Strong Passwords

Posted by Wonderful-Tricks

Create Strong Passwords

To keep Internet intruders from breaking into your computer, you must create strong passwords that are nearly impossible to crack.

Here are some guidelines:
• If you have a simple one-word password like computer, a high-tech thief could crack it in mere minutes.

• If you make the password more robust by adding numbers — like computer33 — it might take the thief an extra 10 minutes to crack it.

• If your password is even more complex — like comPut3r55@$ — the thief would have to work around the clock for days on end before he could come close to cracking it.

• Your password should have a minimum of six digits, with at least three of the following: lowercase letters, uppercase letters, numbers, and special characters.

• The easiest way to create a strong password is to develop a pass-phrase, which is a sentence you can easily remember. Use the first letter of each word in the pass-phrase to create a password. For example, the pass-phrase “Honk if you like computer geeks” becomes the password hiylcg. To make it even stronger, use a combination of upper and lowercase letters, numbers, and special characters that look like actual letters. For example, hiylcg can be changed into h1yLc&.

• For even stronger protection, change your passwords every six months.

Use a Firewall

Posted by Wonderful-Tricks

Use a Firewall

To protect your computer from Internet intruders, it is crucial to use a firewall. Available in hardware and software versions, a firewall acts like a cloaking device to hide your computer from the watchful eyes of online criminals. A firewall also can filter the data that enters your computer, control Internet cookies, and warn you when sinister spyware programs try to transmit data about you over the Web. There are numerous, respected brands of hardware and software firewalls to choose from, each of which will probably suit your needs.

For enhanced protection, use a hardware firewall in combination with a software firewall. If you have two or more computers networked together, using dual firewalls should stop one of the computers from spreading a worm across the network and infecting the other computers. Even if you only have one computer, using both types of firewalls together doesn’t harm anything and gives you increased protection and control of the type of information your computer broadcasts over the Web.

Hardware Firewalls
These are available as stand-alone devices that sit between your computer and the Internet, and they come as a built-in feature of most routers (which are devices used to network computers together to share files and an Internet connection).

Even if you have only one computer in your home or office, a router is a good, inexpensive investment, because you never know when you may purchase an additional computer and want to set up a network. Here are some popular brands of routers (in no particular order):
• Linksys BEFSR41 or BEFSX41
• NetGear RP614
• D-Link DI-604

Software Firewalls
In addition to offering many of the same features as a hardware firewall, a software firewall can alert you when a digital threat like spyware tries to connect to the Internet and transmit your data to online marketers. Also, most software firewalls let you choose which programs can or cannot access the Web. Many reputable software manufacturers have software firewalls available.

Free Firewalls
The following firewall packages are available for free:
• Windows Firewall: A reliable, free firewall known as Windows Firewall is included with Windows XP Service Pack 2. If your computer does not have any other software firewall installed, then Windows Firewall automatically and silently runs in the background to protect you. Although the Windows Firewall will sufficiently protect you from inbound threats that attempt to penetrate your computer, it will not alert you about any outbound threats that try to use your Internet connection. For that reason, it is not recommended.

• ZoneAlarm Free Version: This is one of the best software firewalls — and it won’t cost you a cent. Not only does it protect against inbound and outbound threats, but it also gives you total command over the programs that are allowed to access the Internet. To download it, visit or search for it at

Delete Index Files

Posted by Wonderful-Tricks

Delete Index Files

Even if you cover your Internet tracks by deleting tracking cookies, some information related to them can be left behind in special indexes that have the file extension .dat. To scrub these index files clean, do the following:

1. Delete all of the cookies on your computer

2. Shut down your computer and restart it. After doing so, immediately press the F8 key on your keyboard several times until the Windows Advanced Options Menu screen appears.

3. Use the up or down arrow on your keyboard to select Safe Mode with Command Prompt, and then press the Enter key.

4. The next screen displays Please Select the Operating System to Start.
Assuming you only have Windows XP installed on your system, press the Enter key. If you have more than one operating system installed, use the up or down arrow on your keyboard to select Windows XP, and then press the Enter key.

5. Windows loads some software, which could take a minute or two. Depending on how your version of Windows is configured, a login screen or the Welcome Screen appears. If you see the login screen, type your account name and password (if you have one), and then press the Enter key. If you see the Welcome Screen, click the icon for the account labeled Administrator or an account that has administrative privileges, and then enter your password (if you have one).

6. A command prompt appears. Type CD\ and then press the Enter key.

7. Type del index.dat/s and then press the Enter key.

8. Windows will delete all of your .dat files, which could take a minute or two.

9. You are returned to the command prompt. Type shutdown -r to force your computer to automatically shut down and restart

Delete Tracking Cookies

Posted by Wonderful-Tricks

Delete Tracking Cookies

To protect your privacy, you should delete the tracking cookies lurking on your computer. Because it can be difficult to identify which cookies are tracking and which are trustworthy, the easiest thing to do is simply to wipe the plate clean by erasing all of your cookies at once. Follow these steps:

1. Open Internet Explorer.

2. Click the Tools drop-down menu.

3. Select Internet Options.

4. A window opens. Under the General tab, look for Temporary Internet Files. Underneath this, click the Delete Cookies button.

5. A message pops up and asks, “Delete all cookies in the Temporary Internet Files folder?”

6. Click the OK button.

7. If other users have a Windows account on your computer, have each of them log on to their account and repeat these steps.

Control Cookies

Posted by Wonderful-Tricks

Control Cookies

Computer cookies are small text files that store information about the websites you have visited and the things you did on those sites. Cookies come in two flavors:

trustworthy — which assist and support your Internet usage
and tracking — which are used by Internet marketers to show you customized advertisements.

To control the cookies that are placed on your computer, do the following:

1. Open Internet Explorer.

2. Click the Tools drop-down menu.

3. Select Internet Options.

4. A window opens. Click the Privacy tab.

5. Click the Advanced button.

6. Put a checkmark in the Override Automatic Cookie Handling box.

7. Under the First-party Cookies heading, click the Block button.

8. Put a checkmark in the Always Allow Session Cookies box. This allows websites to place a cookie on your computer that expires the moment you exit the site (which means the cookie cannot be used to track you).

9. Under the Third-party Cookies heading, click the Block button

10. Click the OK button.

11. Now you should be back at the Privacy screen. Click the Sites button.

12. A window opens. In the Address of Web Site box, type the address of trustworthy websites that need cookies to function properly (Web e-mail services such as Hotmail, financial institutions such as your bank or credit-card company, e-merchants such as and eBay, and so on), and then click the Allow button.

13. Type the address of any websites you do not want to receive cookies from (online advertisers like, gambling sites, and so on), and then click the Block button.

14. If you change your mind about a website and want to remove it from this list, simply highlight its name, click the Remove button, and then click OK.

15. When you are finished adding or removing websites to the list, click the OK button.

Beware of Phishing Scams

Posted by Wonderful-Tricks

Beware of Phishing Scams

Phishing (pronounced “fishing”) is a scam that tricks people into revealing their private, personal information (like credit-card numbers and passwords).
Originally, phishing was an e-mail scam in which criminals sent a fake “urgent” message that appeared to be from a respected company or financial institution.

The message asked its recipients to verify or update their account information by clicking a link in the e-mail and visiting a special website. When the victims followed the instructions, the information they entered on the fake website was captured by the criminals and used to commit identity theft. In recent years, this crime has produced several sinister spin-offs. Now, phishing is used more as a term to refer to data-mining scams in general.

Here are some tips to avoid phishing:

• Don’t respond to e-mail asking for private information: Instead, be proactive and call the bank or company and ask them whether they are trying to get in touch with you. Most financial institutions have toll-free phone numbers you can call (usually the numbers are listed on the back of your credit cards).

• Don’t click on links in strange or unexpected e-mail: This is
especially true of those that appear to be from financial institutions.

• Read your e-mail offline (disconnected from the Internet): This will prevent hostile code from being downloaded to your computer if you accidentally click a phishing link in an e-mail. For dial-up users, this is easy: simply log-off your Internet service. For users of always-on, high-speed cable/DSL connections, you will need to turn on the “lock” feature of your software firewall to halt all inbound and outbound Internet activity.

• Don’t click links inside Instant Messages: This is true regardless of whether or not the link was sent to you from someone on your “buddy” list of contacts.

• Never send your personal or financial information in an e-mail or instant message: Like credit-card numbers, social-security numbers, bank-account numbers, passwords, user names, and so on. A normal e-mail or instant message does not have encryption protection, which means it could be intercepted by a criminal who could use your private information to commit identity theft. If you need to give important information to someone, call him or her on the telephone — but only use a landline, because cell-phone calls can also be intercepted.

• Beware of telephone phishing: Do not respond to voicemails from companies asking you to call a special phone number to clear up information about your account. This could be phone phishing. Instead, call their central phone number and find out whether or not they really need to speak with you. Also, be suspicious of companies who call you out of the blue and ask you to verify information like your account number, password, PIN number, mother’s maiden name, social-security number, age, home address, and so on. Don’t tell them anything. Instead, hang up and call their central phone number.

Prevent Spyware Infections

Posted by Wonderful-Tricks

Prevent Spyware Infections

Spyware is a general term describing sinister programs that sneak into your computer by tricking you into installing them or by hiding in other programs you install. The dangers of spyware are that it can do the following:

• Install a “keystroke logging” program that allows a criminal to see everything you type on your keyboard (including passwords and credit-card numbers)

• Hijack your Internet browser and change its default homepage and/or search engine; track your Internet-surfing habits

• Send your private information to hackers who can use it to commit identity theft, or to online marketers who will send you customized pop-up advertisements

How Does Spyware Infect a Computer?
There are numerous ways that spyware can sneak into your computer, including the following:

• Internet advertisements: When you click on a malicious pop-up ad, spyware can be downloaded to your computer.

• File-sharing software: It hides inside programs used for illegally sharing MP3 music files or pirated movies.When you install the software, the spyware is installed at the same time.

• Pirated software: Illegal copies of software purchased on the street or downloaded from the Internet often contain spyware.

• Shareware and freeware: It can lurk inside inexpensive or free software available on the Internet from non-reputable vendors or persons.

• Fake spyware-removal programs: Believe it or not, some antispyware programs actually install spyware.To stay safe from this scam, only install spyware-removal software that has a solid, respected reputation.

• E-mail attachments: Just like a virus, spyware can be installed on your computer when you open an infected e-mail attachment.

• Hackers: A hacker who has already found a way into your computer courtesy of a virus, worm, or Trojan horse, can install spyware on your system.

Block Worms from Invading Your Computer

Posted by Wonderful-Tricks

Block Worms from Invading Your Computer

Follow these tips to stop Internet worms from sneaking into your computer and causing chaos:

• Most antivirus programs also scan for worms, so install a trusted, respected brand of antivirus software and keep it updated constantly.

• Download the most recent Windows patches, updates, and service packs.

• Turn on the Automatic Update feature of Windows to ensure that it automatically downloads and installs the latest Windows security fixes as soon as they are available.

• Do not open e-mail attachments that have file extensions like .exe, .scr, and .vbs, or have double file extensions like .txt.vbs.

• Be wary of opening e-mail attachments sent from people you don’t know.

• Do not click links inside strange e-mails or instant messages (even if the messages are sent from friends or family).

• Do not install pirated software.

• Install the most recent security updates and service packs for all Microsoft Office software (Word, Excel, Access, PowerPoint, Publisher, and so on).

Protect Your Computer from Viruses

Posted by Wonderful-Tricks

Protect Your Computer from Viruses

To prevent infection from digital viruses, create some good habits by following all of these tips:

• Install trusted, respected antivirus software and keep it updated constantly.

• Do not open e-mail attachments that have a file extension of .exe, .scr, .vbs, or double file extensions like .txt.vbs.

• Be wary of opening any e-mail attachments or instant-message attachments sent from people you don’t know — even if those attachments do not have a dangerous file extension.

• Do not open spam e-mail (selling products, offering free videos, pictures, or songs, and so on).

• Perform a virus scan on files before downloading or opening them.

• Perform a virus scan on e-mail attachments you think are safe to open.

• Do not install pirated software, because often it contains viruses.

• Do not download pirated music files or videos, because they too contain viruses.

• Do not click links sent to you in an instant message.


Posted by Wonderful-Tricks


Mouse wheel tricks
If you have a mouse with a scroll wheel on it, you can do some cool tricks…….

1.Shift & Spin

Ever wonder what happens when you hold down the Shift key on a web page and spin the wheel on your wheel mouse? Explorer goes either back or forward, depending on which direction you spin.

Give it a try. Open up Internet Explorer(or any other browser) and follow a few links. Then, hold down your SHIFT key and spin that wheel.

2.CTRL & Spin

If you are in a web browser (Explorer or Netscape or Firefox) , hold down your Ctrl key and spin the wheel. It makes the text larger or smaller depending on which way you spin. For Opera users, it magnifies both the images and the text.

How to reset or format a S60 series phone

Posted by Wonderful-Tricks

How to reset or format a S60 series phone

It worked on All nokia series 60 phones:

Nokia-N-gage,Nokia N-gage Qd, Nokia 3650,Nokia 3660,Nokia 6600,Nokia 6620,
Nokia 3230,Nokia 6260,Nokia 6670,Nokia 7610,Nokia 6630,Nokia 6680,Nokia 6681,
Nokia N70,Nokia N72,Nokia N90,Nokia 3250

It may happens that a program corrupts the C: drive of your phone. In such case, some data can be lost of course but, more annoying, some applications may not work or work only partially,...

On a Series 60 based phone, two key sequences will allow to restore your phone to a cleaner state:

Normal Reset (*#7780#) :
Restores ini files from rom but preserves user data (photos, 3rd party apps etc)

Deep Reset (*#7370#) :
This formats completely the C: drive. All applications and files stored on this drive will be lost and clean default files will be rewritten.

In both case, the phone will ask you a confirmation and you will have to enter a security code (12345 by default).

Files and applications stored on E: drive are not be affected by these sequences.

Full phone formatting or Hard Reset:
Here to let everybody how to perform a Full phone formatting.
If you encounter situation like below on your phone:

1. Blank screen phone unable to reboot.

2. Phone only able to boot-up to "Nokia" word screen.

3. Install some program but not able to uninstall it after that.

4. Unable to delete unwanted files on C drive.

Do a Full phone formatting on your phone as steps below:

  • Make sure you have at least 3/4 point charge of battery power left.
  • Backup your contacts list and personal files to MMC memory card and (or) PC.
  • Switch-off your phone and remove memory card.
  • Press and hold 3 keys:

  • Green dial key
  • * Star key
  • no. 3 key on keypad
  • and then press the power on/off to swtich on the phone.

Remember, do not let go the 3 press and hold keys until you see a formatting word screen show!

  • After a few minutes when the Full phone formatting completed, your phone will be back to original system and factory setttings.

Protect Your Computer from Viruses

Posted by Wonderful-Tricks

Protect Your Computer from Viruses

To prevent infection from digital viruses, create some good habits by following all of these tips:
• Install trusted, respected antivirus software and keep it updated constantly.

• Do not open e-mail attachments that have a file extension of .exe, .scr, .vbs, or double file extensions like .txt.vbs.

• Be wary of opening any e-mail attachments or instant-message attachments sent from people you don’t know — even if those attachments do not have a dangerous file extension.

• Do not open spam e-mail (selling products, offering free videos, pictures, or songs, and so on).

• Perform a virus scan on files before downloading or opening them.

• Perform a virus scan on e-mail attachments you think are safe to open.

• Do not install pirated software, because often it contains viruses.

• Do not download pirated music files or videos, because they too contain viruses.

• Do not click links sent to you in an instant message.

Recover from E-Mail Corruption

Posted by Wonderful-Tricks

Recover from E-Mail Corruption

If Outlook Express alerts you that an error has occurred in directdb.dll or
msoe.dll, then most likely some or all of your e-mail folders are corrupt.

Often this type of corruption is so severe that it prevents Outlook Express from opening. To salvage your e-mail and restore Outlook Express, try the following:

1. Click the Start button in the lower-left corner of Windows.

2. Click Run.

3. A window opens. Type C:\Documents and Settings\Your Account Name\Local Settings\Application Data\Identities

You must replace the words Your Account Name with the name of your Windows XP account. For example, if your account is named Bob, then you should type C:\Documents and Settings\Bob\Local Settings\Application Data\Identities.

Also, if your computer does not have Windows XP installed on the C: drive, then you must insert the appropriate drive letter followed by a colon.

4. Click the OK button or press the Enter key.

5. A window opens. Inside, double-click the folder with the strange, long name that looks something like this: {DA1BA02A-D3AE-4E46-A32C-EF70486F8D28}.

6. Double-click the Microsoft folder.

7. Double-click the Outlook Express folder. Inside are all of the special dbx files that store your e-mail. Click the Edit drop-down menu located at the top of this folder.

8. Click Select All. This highlights all of the dbx files.

9. Again, click the Edit drop-down menu.

10. Click Cut.

11. Go to a folder like My Documents, and then create a new folder.
a. Click the File drop-down menu.
b. Select New.
c. Click Folder.
d. A new folder appears. Rename it something like Outlook Express DBX Files.
e. Double-click the new folder to open it.
f. Inside the folder, right-click the empty space and select Paste.
All of your dbx files are transferred from their old location to this new one.

12. Try to open Outlook Express. If you are successful, then click the File drop-down menu.

13. Select Import.

14. Click Messages.

15. The Outlook Express Import window opens. Scroll down and click Microsoft Outlook Express 6.

16. Click the Next button.

17. A new window opens. Toward the bottom of it, click the Import Mail
from an OE6 Store Directory button.

18. Click the OK button.

19. Click the Browse button, and then locate the folder where you just placed your dbx files.

20. Click the OK button, and then click the Next button.

21. In the next window, choose whether to import all e-mail folders or just certain ones. Then, click the Next button.

22. Your messages are imported into Outlook Express. When the process
is complete, click the Finish button.

23. If this process doesn’t work — or if some of your e-mail is missing —
then you will need to use a special tool named DBXtract to remove each of your e-mail messages from the dbx files. Connect to the Internet and visit to download the program. Follow the on-screen instructions.

Prevent E-Mail Corruption

Posted by Wonderful-Tricks

Prevent E-Mail Corruption

If you send and receive large quantities of e-mail on a regular basis, there are several guidelines you should follow to keep Outlook Express 6 running smoothly and to protect your e-mail folders from becoming corrupt (which could prevent you from accessing them):

• Do not store all of your e-mail in your Inbox. Instead, create new folders, and then move your messages into them.
1. Open Outlook Express.

2. Right-click the Inbox folder.

3. Select New Folder.

4. A window opens. In the empty box, type a name for your new folder.

5. Click the OK button.Your new folder is created as a subfolder below your Inbox.

6. Return to your Inbox, and then drag e-mail messages from it and drop them into your new folder.

• Keep each e-mail folder small. If a folder is stuffed with too many messages, it could become corrupt.

• Do not allow your Sent folder to grow too large. Make a habit of emptying its contents every few weeks.

• Compact your folders at least once a month.

• Install Service Pack 2 for Windows XP, which will improve the way Outlook Express manages and maintains your e-mail.

• Back up your e-mail on a regular basis — particularly if you rely on it for your job.

Blogumulus by Wonderful-Tricks