Quote of the Day

THEION ARTICLES

theionarticles.blogspot.com && speaka1000words.blogspot.com
Showing posts with label Technical. Show all posts
Showing posts with label Technical. Show all posts

Wednesday, January 20, 2016

Air'crafts'

Must you raise your window shades during take-off and landing?

Yes, the seatbelt is essential and so is straightening your seat and folding back your tray table. But do you really have to raise your window shades?

Here’s what you need to know:

Take-off and landing are the trickiest stages of the flight. This is when things are most likely to go wrong, if at all. Cabin crew are required to prepare the aircraft for any contingencies. Apart from ensuring that able-bodied persons man emergency exit doors, they also ensure that passengers are buckled up, electronic devices switched off and bags safely stowed in overhead bins. And then there are those window shades.

In case of an emergency, protocol requires cabin crew to get everyone out of the aircraft in just 90 seconds. Raising the window shades and adjusting cabin lights ensures that your eyes are well-adjusted to the light outside. In an emergency, you will be able to assess the situation outside without wasting crucial seconds. Raising window shades also gives rescue personnel better visibility inside the craft. In short, this could be the difference between life and death.

Plus, it always helps to have an extra pair of eyes. During take-off and landing, passengers have better visibility of the wings and other parts of the aircraft. In case of trouble, they can spot it early and raise a flag.

So try not to be grumpy the next time you’re woken up just to raise your window shades. Someone’s probably saving your life.

On the topic of aircraft windows, do you know "Why do aircraft windows have rounded edges?"

Short answer: to keep you alive

It may not seem so, but the rounded window design is one of the crucial safety features of an aircraft, perhaps more important than your seat-belt and that life-jacket that you hope never to reach for.

Commercial passenger aircraft usually fly at altitudes over 30,000 feet, where air pressure is very low. This can cause severe health complications. To prevent this, pilots turn a knob to maintain a steady air pressure inside the cabin. However, as the aircraft climbs, the pressure inside the cabin becomes much higher than what it is outside.

While the metal fuselage can easily endure this stress, it is the windows that pose a bit of a problem. Stress tends to concentrate towards the edges, which is why surfaces with sharp corners crack easily. With rounded corners, the force is evenly distributed across the pane, making your window virtually shatter-proof.

It is a physics lesson the aviation industry learned the hard way at the start of the jet-age. The first commercial jet-liner, the de Havilland Comet, was built with square windows. In 1954, two years into service, a flight carrying 26 passengers and nine crew members crashed shortly after taking off from Rome. Two years later, another aircraft of the same make met the same fate. In both cases, it was metal fatigue around the windows that ripped the fuselage mid-air.

That was then. Today, aircraft windows are designed to handle loads way beyond what they experience. They also come in a three-layer structure: a convex external window pane shielded by a middle layer buffered by an acrylic screen, which is what you smudge your nose against. There’s also a tiny pinhole in the middle layer, which releases some of the cabin pressure on to the outermost pane. This ensures that if the pressure gets too much to handle, it is the outermost window that will crack, and the middle layer will act as a buffer, ensuring you return to ground as planned.

Courtesy: cntraveller.in

Monday, January 20, 2014

Rebooting Android device?

How Often Should You Reboot Your Android Device?

Most people don’t reboot their phone very often.
Personally, the only time my phone restarts is when it runs out of battery life away from the charger or when something catastrophic happens. Neither of those things happens very often.

But should people like me and you reboot their Android devices more frequently? Or is it an absolutely pointless function that does nothing to help Android?

Let’s find out!

Reasons to restart:
-Installing important Android updates (not just app updates)
-You’ve encountered a serious error, slowdown problem, or other issue
-Your phone feels laggy and slow and you think restarting will help
-You’re rooting your phone and booting into development mode

Reasons not to restart:
-It takes a while
-It drains battery life
-You can’t use your phone for about 2 minutes

Conclusion

You really don’t need to reboot your Android often or at all. The only time Android really needs to reboot itself is when it encounters a major kernel/OS problem. And in 90% of these cases, Android will detect an error and shut itself down anyway.

If you notice your device getting laggy or slow, it might simply be heating up. Restarting would fix that problem, but so would leaving your device unused on the desk for a few minutes.

At the end of the day, you can restart your Android phone or tablet as much as you want. But it really doesn’t do anything unless you’re installing important updates.

Read Source

Sunday, December 16, 2012

Copying large files to external hard drive/flash drive.

Yesterday, while copying some large files to an external hard drive, I was promptly issued this message by Windows:
The file “filename” is too large for the destination file system.
So I wondered to myself what could possibly cause this issue. My external hard drive had tons of free space, so why would I not be able to copy this file over?

Well, the reason for this problem is because my file was 4.3 GB in size and my external hard drive was formatted in FAT32 format. The max file size for FAT32 is 4GB. The max file size for FAT16 is only 2GB!
So how do you fix this problem? Well there are two ways you can go about it. You can either split the file into smaller pieces and then copy it to your external hard drive or you can convert the file system to NTFS, where there is no limit on file sizes. (If the external hard drive is empty, just format it in NTFS mode. Caution: Formatting with data will delete everything in the external drive if not empty)

Now you should be able to copy your large files by either splitting them or converting the hard drive to NTFS! Enjoy!

Courtesy - http://helpdeskgeek.com/help-desk/file-is-too-large-for-destination-file-system/

Saturday, September 29, 2012

Prevent Writing to USB Storage Devices

Prevent Writing to USB Storage Devices


Many system administrators have had some sleepless nights over this: it is too easy for users to connect a device (USB-key or MP3 player) to the USB port of a computer, and copy things off the system. This is an obvious security risk. This has been addressed in Service Pack 2 for Windows XP. You have to manually add the following registry key:

Start the Registry Editor
Go to the HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control key
If there is no key called StorageDevicePolicies, create it. You do this by right-clicking the HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control key, and selecting New > Key from the menu.

Select the StorageDevicePolicies key
From the menu select Edit > New > DWORD Value
Name the new value WriteProtect
Right-click the WriteProtect value and choose Modify
In the Value Data: box enter 1
Exit the registry editor, and restart your computer

To reverse, just delete the new WriteProtect value (or set the value to 0) and restart the computer.

Note: works on Windows XP Service Pack 2 only!

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Courtesy & More info:


Monday, January 31, 2011

TRAI's new SMS Regulations,SMSing Policy Changes

New TRAI policy on Spam SMS is all set to create chaos?

Starting Feb 1st (2011), telecom operators will have to comply to new TRAI guidelines on SMS spam and while the deed is noble, it will create more confusion for consumers.

First, the fineprint.

- From Feb 1, there will only be 2 categories of messages- Transactional (Bank alerts, Railway & Airline alerts, Messages to parents from school etc) and Non transactional or Promotional (all remaining categories except mentioned earlier – like courier alerts, spam, marketing offers, news alerts, subscribed SMS services, intra company or group messages and so on)

- Only transactional messages will have full branded sender id (like TA-HDFCBANK) for others, there will be a 6 digit code (like TA-n12345 or TA-nABCDE), where n is the category of the message and further 5 digits are the unique code given by the telecom operator to each aggregator.

- All non-transactional messages will be compulsorily passed through the NDNC filter.(This means, you will NOT receive the subscribed/ paid news alert or even your courier status message if you are registered with DND) and will be allowed only during 9am to 9pm.

As a consumer, you will now have to open each and every non-transactional message to check on the content. So far, you could easily delete a message just by checking the names, but now ensure that you open each and every sms to see if there is something important.

Moreover, does this mean that you need to unsubscribe from DND to get other relevant & important messages (that TRAI considers non-transactional)?.

What’s your take? What will be the impact of this on bulk sms services? Operators have started testing this regulation – so chances of the implementation being delayed is minimal.

NCPR – Boon or Bust for SMS Pull services?

No doubt unsolicited calls and SMS have been a menace to Indian society for a long time. People from both sides of the table have lobbied extensively with the government to keep their side of the business running. TRAI created the National Do Not Call registry against this Unsolicited Commercial Communication (UCC), but without enforcement or awareness it just seemed like an half hearted attempt. But now with the new guidelines being laid down by the TRAI (now called NCPR) it appears that the government is indeed serious to curb this menace. Or is it?

NCPR appears to have sharper claws compared to NDNC by making the operator party to the UCC. Operator cannot get away this time by passing the blame on to the aggregator. The fines imposed on a complaint registered are quite steep to make both the operator and aggregator sit up and screen the messages being sent over their network. For Bulk SMSes, it defines two categories, Transactional and Promotional. Transactional SMS, according to their FAQ is any message sent by Financial institution, Railways, Airlines or Educational institutions to it’s registered users. Everything else is termed as Promotional.

It appears that the consumers are indeed going to be happy with this new guideline if implemented and enforced to the dot. But they will also not be able to use any of the pull services that they were used to due to this blanket ban on such communication. Google (SMS number 9 77 33 00000), Facebook (92-FACEBOOK) and our own direction services (90088 90088) rely on consumers sending a SMS, and the service replying to the requested sms. TRAI guideline does not talk about these services, and since the operators are going to term any Bulk SMS as a promotional SMS,

  • People registered in NCPR/NDNC will not be able use these services,
  • People will lose interactivity as the message now will not come from the virtual 10 digit number and
  • No one (even people not registered in NCPR/NDNC) will be able to use the service between 9PM and 9AM.

This guideline is definitely something good against the UCC, but it appears that not a lot of thought has been given while drafting it. TRAI seems unapproachable to any of our queries. It requests Tele-Marketer to register with http://www.nccptrai.gov.in after paying Rs 10,000/- and download the list of NCPR registered users for scrubbing, but the site just provides a CSV file with zero rows in it.

Is this yet another half hearted attempt by the TRAI to address Unsolicited communication? Is this going to kill the nascent industries banking on SMS pull services?

Only time will tell.

Courtesy: plugged.in

a Mail from way2sms.com, a free online SMS service provider informs the same:

Dear User,

As many of you may be aware, the Telecom Regulatory Authority of India (TRAI) recently issued new regulations on the SMS industry in India. These regulations are designed to significantly curb the sending of unsolicited commercial SMSes to consumers. Starting from Feb 1st 2011 every SMS service provider has to adhere to the new TRAI NCPR (National Consumer Preference Register (NCPR)) guidelines. Check www.nccptrai.gov.in for more details on new TRAI guidelines.

Being the Leader in the mobile messaging, Way2sms strictly adheres to TRAI guidelines from feb 1st in order to protect consumer privacy from SMS spammers. As part of implementing new TRAI guidelines, way2sms has worked tirelessly to further upgrade our internal processes, technology, and team to ensure 100% compliance of the new regulations.

In order to adhere to TRAI guidelines way2sms is also changing its messaging policies from 1st of Feb. 2011 onwards.

New Policies

* According to the New TRAI guidelines, No SMS provider is allowed to deliver SMSes to NDNC/NCPR listed mobile numbers. So, Starting from Feb 1st 2011 way2sms does not deliver SMSes to NDNC//NCPR Listed mobile numbers.
* TRAI New guidelines does not allow any service provider to use Numeric mobile number as the sender. So, Starting from Feb 1st, way2sms is changing its Message structure.


- All messages sent via way2sms will be sent as " TD- XXXXX" as the sender. No Longer you can use your mobile number as sender

- Your Mobile number and a 8 letter Nick name will be inserted in your message by default. However you can continue to enjoy 140characters message same as before. We thank you for your cooperation.

Best Wishes
WAY2SMS TEAM.

Link to check if your/your friends' mobile is registered under these services:

http://ndncregistry.gov.in/ndncregistry/search.misc
http://www.nccptrai.gov.in/nccpregistry/search.misc

Thursday, January 20, 2011

Kudos to TRAI - Mobile number Portability is here

Mobile Number Portability is here!!!

After a long wait, the mobile number portability (MNP) is finally here. Set for a nationwide roll-out today, MNP will usher in an era of new freedom for mobile subscribers in the country. The technology will allow subscribers to change their mobile service provider without the fear of losing their old mobile number.

This means users will be able to retain their old mobile number even after they decide to change their service provider. And yes, the service is available for both postpaid and prepaid customers and also on both GSM and CDMA platforms.

The consumer-friendly service was mooted over two years ago and was planned to be implemented by the end of 2009. However, implementation had to be deferred several times owing to reasons ranging from lack of preparedness of operators to delay in appointment of an agency to oversee MNP execution.

As per the eligibility criteria, there should not be any outstanding payment by way of pending bills before customers can apply for availing of MNP services, the Department of Telecom (DoT) said.

It also said that the mobile number sought to be ported should not be subjudice and also there should not be pending request for change of ownership of the mobile number.

The DoT has claimed that the entire process of switching operators would take a maximum of seven days and subscribers may face disruption of services for about two hours during that period.

"The maximum time period for porting would become seven working days except in Jammu & Kashmir, Assam and North East licensed service areas, wherein it would be 15 working days," the Telecom Regulatory Authority of India said in a statement.

Switch by high spending, post-paid subscribers, business subscribers could start another round of price war among operators. High-end users make up 5 per cent of the total subscriber base but generate around 20 per cent of revenue.

India has more than 700 million subscribers across the country with nearly 10 operators in each circle.

Customers willing to exercise the option of changing their service provider without change of number will have to follow the following simple steps.

Send an SMS to 1900 in following format: PORT - eg. PORT 9999999999.

You will get an SMS reply that contains a unique porting code from the existing service provider.(This code is valid only for a few days, and one must apply again if it expires.)

The customer can then make an application in the prescribed form (SMS to the preferred operator quoting the unique code) mentioning the code to the selected new service provider for porting of number.

Your existing operator will check with new operator & if there are no dues then approval will be given for porting.

You will get an SMS on the time and date when porting will take place. Rules mandate that process be completed within 4 days of applying. However a period of seven days has been prescribed for completion of porting (transfer) of the mobile number to the network of the new service provider.

After porting is complete, wait for an SMS from your new operator confirming the switch. Your phone may be dead for about 2 hours when the porting takes place.

Excerpts from the TRAI direction for the mobile service providers released on 10 Feb 2010:

A mechanism for the purpose of receiving Short Message Service messages from its subscribers requesting for a unique porting code which shall provide:-

(i) a Unique Porting Code consisting of 8 characters of which the first two shall be alphabets that denote the service provider code and service area code which have been specified by the Authority (for example: TD for Tata Teleservices Ltd in Delhi service area) and the remaining 6 characters shall contain 1 to 9, A-N & P-Z only, and small letters and the alphabet ‘O’ shall not be allowed;

(ii) the Unique porting Code allocated to a subscriber shall be valid for a period of fifteen days from the date of request or such time till the number is ported out, whichever is earlier, for all service areas except Jammu & Kashmir, Assam and North East licensed areas where the validity for the Unique Porting Code allocated to a subscriber shall be valid for a period of thirty days from the date of request or till such time the number is ported out, which ever is earlier, irrespective of. number of requests the subscriber makes; and,

(iii) the Short Message Service (SMS) text for requesting Unique Porting Code by a subscriber shall be the word ‘PORT’ followed by a space followed by the ten digit mobile number which is to be ported which shall be case insensitive. (i.e. it can be port or Port etc.) and in case the subscriber’s Caller Line Identification does not match with the ten digit mobile number, Unique Porting Code shall not be allotted but a message shall be generated to inform such subscriber that the Caller Line Identification does not match with the mobile number.

Courtesy: Times of India, NDTV, TRAI.GOV.IN

Friday, December 10, 2010

Top Level Domains in Internet

Country Code Top-Level Domains

A country code top-level domain (ccTLD) is an Internet top-level domain generally used or reserved for a country or a dependent territory.

ccTLD identifiers are two letters long, and all two-letter top-level domains are ccTLDs. Creation and delegation of ccTLDs is performed by the Internet Assigned Numbers Authority (IANA), and with certain exceptions corresponds to the ISO 3166-1 alpha-2 country codes maintained by the ISO 3166 Maintenance Agency.

List of ccTLDs

*=Foreign registration permitted

A
.ac – Ascension Island *
.ad – Andorra
.ae – United Arab Emirates
.af – Afghanistan
.ag – Antigua and Barbuda *
.ai – Anguilla
.al – Albania
.am – Armenia *
.an – Netherlands Antilles
.ao – Angola
.aq – Antarctica
.ar – Argentina
.as – American Samoa *
.at – Austria *
.au – Australia
.aw – Aruba
.ax – Aland Islands
.az – Azerbaijan

B
.ba – Bosnia and Herzegovina
.bb – Barbados
.bd – Bangladesh
.be – Belgium *
.bf – Burkina Faso
.bg – Bulgaria
.bh – Bahrain
.bi – Burundi *
.bj – Benin
.bm – Bermuda
.bn – Brunei
.bo – Bolivia *
.br – Brazil *
.bs – Bahamas *
.bt – Bhutan
.bv – Bouvet Island (not in use; no registrations)
.bw – Botswana
.by – Belarus
.bz – Belize *

C
.ca – Canada
.cat – Catalunya
.cc – Cocos (Keeling) Islands *
.cd – Democratic Republic of the Congo (formerly .zr – Zaire) *
.cf – Central African Republic
.cg – Republic of the Congo *
.ch – Switzerland *
.ci – Côte d'Ivoire (Ivory Coast)
.ck – Cook Islands *
.cl – Chile
.cm – Cameroon
.cn – People's Republic of China *
.co – Colombia
.cr – Costa Rica
.cu – Cuba
.cv – Cape Verde
.cx – Christmas Island *
.cy – Cyprus
.cz – Czech Republic

D
.de – Germany
.dj – Djibouti *
.dk – Denmark *
.dm – Dominica
.do – Dominican Republic
.dz – Algeria

E
.ec – Ecuador
.ee – Estonia
.eg – Egypt
.eh – Western Sahara (not assigned; no DNS)
.er – Eritrea
.es – Spain *
.et – Ethiopia
.eu – European Union (code "exceptionally reserved" by ISO 3166-1)

F
.fi – Finland
.fj – Fiji *
.fk – Falkland Islands
.fm – Federated States of Micronesia *
.fo – Faroe Islands
.fr – France

G
.ga – Gabon
.gb – United Kingdom (Reserved domain by IANA; deprecated – see .uk)
.gd – Grenada
.ge – Georgia
.gf – French Guiana
.gg – Guernsey
.gh – Ghana
.gi – Gibraltar
.gl – Greenland *
.gm – Gambia
.gn – Guinea
.gp – Guadeloupe
.gq – Equatorial Guinea
.gr – Greece *
.gs – South Georgia and the South Sandwich Islands *
.gt – Guatemala
.gu – Guam
.gw – Guinea-Bissau
.gy – Guyana

H
.hk – Hong Kong *
.hm – Heard Island and McDonald Islands *
.hn – Honduras *
.hr – Croatia
.ht – Haiti
.hu – Hungary *

I
.id – Indonesia
.ie – Ireland
.il – Israel *
.im – Isle of Man *
.in – India *
.io – British Indian Ocean Territory *
.iq – Iraq
.ir – Iran *
.is – Iceland
.it – Italy

J
.je – Jersey
.jm – Jamaica
.jo – Jordan
.jp – Japan

K
.ke – Kenya
.kg – Kyrgyzstan
.kh – Cambodia
.ki – Kiribati
.km – Comoros
.kn – Saint Kitts and Nevis
.kp – North Korea
.kr – South Korea
.kw – Kuwait
.ky – Cayman Islands
.kz – Kazakhstan *

L
.la – Laos *
.lb – Lebanon
.lc – Saint Lucia
.li – Liechtenstein *
.lk – Sri Lanka
.lr – Liberia
.ls – Lesotho
.lt – Lithuania
.lu – Luxembourg
.lv – Latvia *
.ly – Libya *

M
.ma – Morocco
.mc – Monaco
.md – Moldova *
.me – Montenegro
.mg – Madagascar
.mh – Marshall Islands
.mk – Republic of Macedonia
.ml – Mali
.mm – Myanmar
.mn – Mongolia *
.mo – Macau
.mp – Northern Mariana Islands *
.mq – Martinique
.mr – Mauritania
.ms – Montserrat *
.mt – Malta
.mu – Mauritius *
.mv – Maldives
.mw – Malawi *
.mx – Mexico *
.my – Malaysia
.mz – Mozambique

N
.na – Namibia *
.nc – New Caledonia
.ne – Niger
.nf – Norfolk Island *
.ng – Nigeria
.ni – Nicaragua
.nl – Netherlands *
.no – Norway
.np – Nepal
.nr – Nauru *
.nu – Niue *
.nz – New Zealand *
.nc.tr – North Cyprus *

O
.om – Oman

P
.pa – Panama
.pe – Peru
.pf – French Polynesia
.pg – Papua New Guinea
.ph – Philippines *
.pk – Pakistan *
.pl – Poland *
.pm – Saint Pierre and Miquelon
.pn – Pitcairn Islands *
.pr – Puerto Rico *
.ps – Palestine *
.pt – Portugal *
.pw – Palau
.py – Paraguay

Q
.qa – Qatar

R
.re – Réunion
.ro – Romania *
.rs – Serbia
.ru – Russia *
.rw – Rwanda

S
.sa – Saudi Arabia
.sb – Solomon Islands *
.sc – Seychelles *
.sd – Sudan
.se – Sweden *
.sg – Singapore
.sh – Saint Helena *
.si – Slovenia
.sj – Svalbard and Jan Mayen islands (not in use; no registrations)
.sk – Slovakia
.sl – Sierra Leone
.sm – San Marino *
.sn – Senegal
.so – Somalia * (down, still is delegated to Monolith [ ml.org] Philadelphia, an entity defunct since end-1998)
.sr – Suriname *
.st – São Tomé and Príncipe *
.su – Soviet Union (deprecated; being phased out; code "transitionally reserved" by ISO 3166-1)
.sv – El Salvador
.sy – Syria *
.sz – Swaziland *

T
.tc – Turks and Caicos Islands
.td – Chad
.tf – French Southern Territories
.tg – Togo *
.th – Thailand
.tj – Tajikistan *
.tk – Tokelau *
.tl – East Timor (formerly .tp) *
.tm – Turkmenistan *
.tn – Tunisia
.to – Tonga *
.tp – East Timor (deprecated – use .tl; code "transitionally reserved" by ISO 3166-1)
.tr – Turkey
.tt – Trinidad and Tobago *
.tv – Tuvalu *
.tw – Taiwan *
.tz – Tanzania

U
.ua – Ukraine
.ug – Uganda *
.uk – United Kingdom (code "exceptionally reserved" by ISO 3166-1) (see also .gb)
.us – United States *
.uy – Uruguay
.uz – Uzbekistan

V
.va – Vatican City
.vc – Saint Vincent and the Grenadines *
.ve – Venezuela
.vg – British Virgin Islands *
.vi – United States Virgin Islands
.vn – Vietnam
.vu – Vanuatu *

W
.wf – Wallis and Futuna
.ws – Samoa (formerly Western Samoa) *

Y
.ye – Yemen
.yt – Mayotte
.yu – Yugoslavia (subsequently renamed Serbia and Montenegro)

Z
.za – South Africa *
.zm – Zambia
.zw – Zimbabwe

Active:
.ac .ad .ae .af .ag .ai .al .am .an .ao .aq .ar .as .at .au .aw .ax .az .ba .bb .bd .be .bf .bg .bh .bi .bj .bm .bn .bo .br .bs .bt .bw .by .bz .ca .cc .cd .cf .cg .ch .ci .ck .cl .cm .cn .co .cr .cu .cv .cx .cy .cz .de .dj .dk .dm .do .dz .ec .ee .eg .er .es .et .eu .fi .fj .fk .fm .fo .fr .ga .gd .ge .gf .gg .gh .gi .gl .gm .gn .gp .gq .gr .gs .gt .gu .gw .gy .hk .hm .hn .hr .ht .hu .id .ie .il .im .in .io .iq .ir .is .it .je .jm .jo .jp .ke .kg .kh .ki .km .kn .kp .kr .kw .ky .kz .la .lb .lc .li .lk .lr .ls .lt .lu .lv .ly .ma .mc .me .md .mg .mh .mk .ml .mm .mn .mo .mp .mq .mr .ms .mt .mu .mv .mw .mx .my .mz .na .nc .ne .nf .ng .ni .nl .no .np .nr .nu .nz .om .pa .pe .pf .pg .ph .pk .pl .pn .pr .ps .pt .pw .py .qa .re .ro .rs .ru .rw .sa .sb .sc .sd .se .sg .sh .si .sk .sl .sm .sn .sr .st .sv .sy .sz .tc .td .tf .tg .th .tj .tk .tl .tm .tn .to .tr .tt .tv .tw .tz .ua .ug .uk .us .uy .uz .va .vc .ve .vg .vi .vn .vu .wf .ws .ye .za .zm .zw

Reserved/unassigned: .bl .eh .mf
Allocated/unused: .bv .gb .pm .sj .so .um .yt
Phaseout: .su .tp .yu
Deleted/retired: .cs .zr

Generic top-level domain

A generic top-level domain (gTLD) is a top-level domain used (at least in theory) by a particular class of organization. These are three or more letters long, and are named for the type of organization that they represent (for example, .com for commercial organizations). The following gTLDs currently exist[1] (as does .arpa, which is sometimes considered a gTLD):

.aero - for the air transport industry
.asia - for companies. organisations and individuals in the Asia-Pacific region
.biz - for business use
.cat - for Catalan language/culture
.com - for commercial organizations, but unrestricted
.coop - for cooperatives
.edu - for post-secondary educational establishments
.eu - for companies. organisations and individuals in the European Union
.gov - for governments and their agencies in the United States
.info - for informational sites, but unrestricted
.int - for international organizations established by treaty
.jobs - for employment-related sites
.mil - for the US military
.mobi - for sites catering to mobile devices
.museum - for museums
.name - for families and individuals
.net - originally for network infrastructures, now unrestricted
.org - originally for organizations not clearly falling within the other gTLDs, now unrestricted
.pro - for certain professions
.tel - for services involving connections between the telephone network and the Internet (added March 2, 2007)

.travel - for travel agents, airlines, hoteliers, tourism bureaus, etc.

.post - is a proposed top-level domain for the internet, submitted to ICANN for approval as a sponsored TLD. It would be restricted to the use of national and regional postal services, and private businesses that provide similar services. It is sponsored by the Universal Postal Union, an international organisation based in Bern, Switzerland. As of August 2006, approval and implementation has not yet happened, overshooting the deadline of 2005.

.tel - is a top-level domain approved by ICANN as a sponsored TLD. It would be restricted to "internet communication" services, and provide a supplement to the traditional numeric namespace for telecommunication services ( i.e. telephone numbers). It is sponsored by Telname Limited. In May 2006, it was approved to be added to the global DNS root. The TLD was added to the root servers on March 2, 2007.

.xxx - is a proposed top-level domain (TLD) intended as a voluntary option for sexually explicit sites on the Internet. The name is inspired by the former MPAA and BBFC "X" rating, now commonly applied to pornographic movies as "XXX". ICANN announced in June 1, 2005 that

.xxx would become a sponsored top-level domain similar to .aero, .travel, etc. but it was never implemented. On May 10, 2006, ICANN reversed its decision, and on March 30, 2007, ICANN rejected the .xxx proposal a third time

Generic top-level domains
Unsponsored: .biz .com .edu .gov .info .int .mil .name .net .org
Sponsored: .aero .asia .cat .coop .jobs .mobi .museum .pro .tel .travel
Infrastructure: .arpa .root
Proposed locations: .berlin .lat .nyc children: .kid .kids
language communities: .bzh .cym .gal .sco
technical: .geo .mail .web other: .post .xxx
Deleted/retired: .nato
Reserved: .example .invalid .localhost .test
Pseudo-domains: .bitnet .csnet .ip .local .onion .uucp

Friday, November 14, 2008

Tips, Tips, Tips!!!

To delete all Hyperlinks in a Excel sheet...
==============================
1. Sub DeleteHyperLinks()
Sheet1.Hyperlinks.Delete
End Sub

2. And if you don’t need a reusable Sub routine, rather a one time fix, use the Immediate Window:

a. Select the Sheet to remove Hyperlinks from
b. Press Alt+F11 to open the VBE
c. On the VBE Main Menu choose View->Immediate Window
d. In the Immediate Window paste the following code then hit Enter

ActiveSheet.Hyperlinks.Delete

----> However the second one didn't work for me!!!


Watch Movies In a Spreadsheet
======================

Watch or listen to movies in Excel, while you work in Excel:

1. On the main menu click Insert->Object
2. Select Windows Media Player from the Object Type box and hit OK
3. Move and resize the WMP to your liking

Note: If you can’t resize the WMP object, switch to “Design Mode” by clicking the design mode button

Now we’ll add some code to tell the Windows Media Player object to Play and what file to play. Open the Visual Basic Editor(alt+F11), double click the worksheet that contains the WMP you just inserted and Paste the following code:

Sub PlayMovie()
'URL is the location of the movie - change appropriately
WindowsMediaPlayer1.URL = "C:/rb.wmv"
WindowsMediaPlayer1.Controls.Play
End Sub
Play the movie just as you would run a Macro: Tools->Macro->Macros

You may also want to create a couple of shortcuts to Hide and Stop playing the Movie if the boss approaches. Add the following code below the previous code:

Sub HideQuick()
WindowsMediaPlayer1.Visible = False
WindowsMediaPlayer1.Controls.pause
End Sub

Sub ShowQuick()
WindowsMediaPlayer1.Visible = True
WindowsMediaPlayer1.Controls.Play
End Sub
Next add shortcuts to the 2 macros (Tools->Macro->Macros->Options) and you have an instant ON/OFF switch at your fingertips.

SideNote: While watching a movie directly in Excel is interesting, my favorite way to watch a movie while working is using the stand alone Media Player with a few different options set.

From the Tools->Options menu check the box “Display On Top when in Skin Mode”. From the View menu select “Skin Mode” (a small skin works best). Move your movie to the bottom right or left of your screen.

With this setup I can work and also switch between apps and always have my movie visible, yet out of the way. Thanks to Kingzter.

Friday, September 5, 2008

Understanding IP addresses

Understanding IP addresses in computers:

Internet Protocol or IP addresses are common in today's world of networked computers. That's because every computer connected to a single network has an IP.

Washington: An IP address is a number that uniquely identifies a computer on a network. Every computer that's connected to a network, whether that network is the Internet or a private home or office network, has a unique IP address.

IP addresses consist of four sets of numbers, with each set separated by a period (dot), such as 192.168.100. 111. Every domain name, such as www. microsoft.com, maps to a particular IP address. IP addresses are meted out either as static or dynamic. A static IP address never changes. It's the type used by most major websites.

A dynamic IP address is automatically assigned to a computer when you log on to a network. Most Internet Service Providers (ISPs) assign dynamic IP addresses to their customers. There are two types of IP addresses, internal and external. An internal IP address is also typically referred to as "non routable". That means that it's an IP address which usually is not exposed to the outside world.

Each computer in a home or office network has an internal IP address, and it's that address that you would use to make one computer in an office network, for example, talk to talk to another computer within the same network.

To find your internal IP address, open the Windows Start menu, and select Run. On Windows Vista, simply press Windows Key-R. The Run dialog box opens. Type "cmd," without the quotation marks, in the Run dialog box, and press Enter. A DOS command prompt opens.

From the command prompt, type "ipconfig," without the quotation marks, and press Enter. In a second, Windows will return a small report labelled "Windows IP Configuration. " Note that one of those lines, labelled "IP Address," provides your internal IP address. Write those numbers down. To exit the command window, type "exit," and press Enter.

Note that if your computer is configured to obtain an IP address automatically, as many are, this number could change periodically, especially if you must unplug the network cable and then plug it in to another outlet somewhere in a corporation or your home. Therefore, remember this procedure for retrieving your IP address.

An external IP address has also assigned by your ISP to the computer or router that's connected to the ISP. An IP address is normally no secret. Websites, your Internet Service Provider (ISP), and others can track your IP address, allowing or forbidding access to certain resources if they wish.

You can hide your IP address, however, by using one of the many so-called cloaking services available on the Internet. Cloaking services use what's known as a proxy server to conceal your identity online by providing you with a temporary fake IP address. To use a cloaking service, you typically log on to the cloaking site and use a form field to type in the address of the website you'd like to visit. Once you click "go," you're taken to the website through the cloaking service, and your IP address is hidden. It not only disguises your IP but also allows you to determine the level of security you'd like.

My System Restores have vanished!!

My System Restores Have Vanished!!

Has this happened to you?

Strange as it may sound, a friend of mine has indeed had this complaint. (For those who don't know, System Restore brings back the PC to an earlier good working state.)

Say you've installed a new program and it causes a problem even after uninstalling it -- System Restore can help you here, as it backs up important system files and the Registry automatically. But there are reasons for it not doing so. After some investigation, here are a few important facts I found.

1. System Restore needs space. You need to dedicate some space for System Restore activities. Windows does this automatically, but if you aren't like my silly friend, don't fill up your primary partition's C drive with all your data, which can cause System Restore to not make any further restore files. See that you have at least 1 GB to 2 GB free on your C partition for Windows to work properly.

2. System Restore needs the Task Scheduler service to function. I'd made this mistake myself -- I'd disabled the service since I don't use Windows Task Scheduler. To check whether you have the Task Scheduler service running:

a. Go to Start Run or just Start in Vista.

b. Type in services.msc, and click OK.

c. Click on any one of the entries on the right pane and hit T on the keyboard to quickly run down to Task Scheduler.

d. Check whether the Status is set to Started (meaning "running,") and that Startup Type is Automatic.

e. If it's not, double-click on it, set the Startup Type to Automatic and click on the Start button to instantly start the service.

3. Last, if you can't get System Restore Points to work, just disable all system restoration and re-enable it. This will give System Restore a fresh start. To do this:

a. Right-click My computer and go to Properties.

b. Go to the System Restore tab.

c. Click on the first option (Turn off System Restore on all drives).

Sunday, May 25, 2008

Windows Vienna - newbie in the Microsft stable

Windows "Vienna" (formerly known as Blackcomb) is Microsoft's codename for a future version of Microsoft Windows, originally announced in February 2000, but has since been subject to major delays and rescheduling.
The code name "Blackcomb" was originally assigned to a version of Windows that was planned to follow Windows XP (codenamed "Whistler"; both named after the Whistler-Blackcomb resort) in both client and server versions. However, in August 2001, the release of Blackcomb was pushed back several years and Vista (originally codenamed "Longhorn" after a bar in the Whistler Blackcomb Resort) was announced as a release between XP and Blackcomb.

Since then, the status of Blackcomb has undergone many alterations and PR manipulations, ranging from Blackcomb being scrapped entirely, to becoming a server-only release. As of 2006, it is still planned as both a client and server release with a current release estimate of anytime between 2009 and 2012, although no firm release date or target has yet been publicized.

In January 2006, "Blackcomb" was renamed to "Vienna".

Originally, internal sources pitched Blackcomb as being not just a major revision of Windows, but a complete departure from the way users today typically think about interacting with a computer. While Windows Vista is intended to be a technologies-based release, with some added UI sparkle (in the form of the Windows Aero set of technologies and guidelines), Vienna is targeted directly at revolutionizing the way users of the product interact with their PCs.

For instance, the "Start" philosophy, introduced in Windows 95, may be completely replaced by the "new interface" which was said in 1999 to be scheduled for "Vienna" (before being moved to Vista ("Longhorn") and then back again to "Vienna").

The Explorer shell will be replaced in its entirety, with features such as the taskbar being replaced by a new concept based on the last 10 years of R&D at the Microsoft "VIBE" research lab. Projects such as GroupBar and LayoutBar are expected to make an appearance, allowing users to more effectively manage and keep track of their applications and documents while in use, and a new way of launching applications is expected—among other ideas, Microsoft is investigating a pie menu-type circular interface, similar in function to the dock in Mac OS X.

Several other features originally planned for Windows Vista may be part of "Vienna", though they may be released independently when they are finished.

"Vienna" will also feature the "sandboxed" approach discussed during the Alpha/White Box development phase for Longhorn. All non-managed code will run in a sandboxed environment where access to the "outside world" is restricted by the operating system. Access to raw sockets will be disabled from within the sandbox, as will direct access to the file system, hardware abstraction layer (HAL), and complete memory addressing. All access to outside applications, files, and protocols will be regulated by the operating system, and any malicious activity will be halted immediately. If this approach is successful, it bodes very well for security and safety, as it is virtually impossible for a malicious application to cause any damage to the system if it is locked in what is effectively a glass box.

Another interesting feature mentioned by Bill Gates is "a pervasive typing line that will recognize the sentence that [the user is] typing in." The implications of this could be as simple as a "complete as you type" function as found in most modern search engines, (e.g. Google Suggest) or as complex as being able to give verbal commands to the PC without any concern for syntax. This former feature has been incorporated to an extent in Windows Vista.

Microsoft has stated that "Vienna" will be available in both 32-bit and 64-bit for the client version, in order to ease the industry's transition from 32-bit to 64-bit computing. Vienna Server is expected to support only 64-bit server systems. There will be continued backward compatibility with 32-bit applications, but 16-bit Windows and MS-DOS applications will not be supported as in Windows Vista 64-bit versions. They are already unsupported in 64-bit versions of XP and Server 2003.

Friday, May 23, 2008

Great Software Bugs....

This is an interesting collection of greatest software bugs Read it and enjoy it.

10. Mariner 1 Venus probe loses its way: 1962
A probe launched from Cape Canaveral was set to go to Venus. After takeoff, the unmanned rocket carrying the probe went off course, and NASA had to blow up the rocket to avoid endangering lives on earth. NASA later attributed the error to a faulty line of FORTRAN code.

The report stated, "Somehow a hyphen had been dropped from the guidance program loaded aboard the computer, allowing the flawed signals to command the rocket to veer left and nose down... Suffice it to say, the first U.S. attempt at interplanetary flight failed for want of a hyphen." The vehicle cost more than $80 million, prompting Arthur C.Clarke to refer to the mission as "the most expensive hyphen in history."



9. Radiation machine kills four: 1985 to 1987
Faulty software in a Therac-25 radiation-treatment machine made by Atomic Energy of Canada Limited (AECL) resulted in several cancer patients receiving lethal overdoses of radiation. Four patients died. When their families sued, all the cases were settled out of court. A later investigation by independent scientists Nancy Leveson and Clark Turner found that accidents occurred even after AECL thought it had fixed particular bugs. "A lesson to be learned from the Therac-25 story is that focusing on particular software bugs is not the way to make a safe system," they wrote in their report." The basic mistakes here involved poor software-engineering practices and building a machine that relies on the software for safe operation."



8. AT&T long distance service fails: 1990
Switching errors in AT&T's call-handling computers caused the company's long-distance network to go down for nine hours, the worst of several telephone outages in the history of the system. The meltdown affected thousands of services and was eventually traced to a single faulty line of code.



7. Patriot missile misses: 1991
The U.S. Patriot missile's battery successfully headed off many Iraqi Scuds during the Gulf War. But the system also failed to track several incoming Scud missiles, including one that killed 28 U.S. soldiers in a barracks in Dhahran, Saudi Arabia. The problem stemmed from a software error that put the tracking system off by 0.34 of a second.

As Ivars Peterson states in Fatal Defect, the system was originally supposed to be operated for only 14 hours at a time. In the Dhahran attack, the missile battery had been on for 100 hours. This meant that the errors in the system's clock accumulated to the point that the tracking system no longer functioned. The military had in fact already found the problem but hadn't sent the fix in time to prevent the barracks explosion.



6. Pentium chip fails math test: 1994
The concept of bugs entered the mainstream when Professor Thomas Nicely at Lynchburg College in Virginia discovered that the Pentium chip gave incorrect answers to certain complex equations. In fact, the bug occurred rarely and affected only a tiny percentage of Intel's customers. The real problem was the nonchalant way Intel reacted.

"Because we had been marketing the Pentium brand heavily, there was a bigger brand awareness," says Richard Dracott, Intel director of marketing. "We didn't realize how many people would know about it, and some people were outraged when we said it was no big deal." Intel eventually offered to replace the affected chips, which Dracott says cost the company $450 million. To prove that it had learned from its mistake, Intel then started publishing a list of known "errata," or bugs, for all of its chips.



5. Intuit's MacInTax leaks financial secrets: 1995
Intuit's tax software for Windows and Macintosh has suffered a series of bugs, including several that prompted the company to pledge to pay any resulting penalties and interest. The scariest bug was discovered in March 1995: the code included in a MacInTax debug file allowed UNIX users to log in to Intuit's master computer, where all MacInTax returns were stored. From there, the user could modify or delete returns. Intuit later ended up winning BugNet's annual bug-fix award in 1996 by responding to bugs faster than any other major vendor.



4. New Denver airport misses its opening: 1995
The Denver International Airport was intended to be a state-of-the-art airport, with a complex, computerized baggage-handling system and 5,300 miles of fiber-optic cabling. Unfortunately, bugs in the baggage system caused suitcases to be chewed up and drove automated baggage carts into walls. The airport eventually opened 16 months late, $3.2 billion over budget, and with a mainly manual baggage system.



3. Java opens security holes; browsers simply crash: 1996 to 1997
All right, this is not a single bug but a veritable bug collection. We include this entry because the sheer quantity of press coverage about bugs in Sun's Java and the two major browsers has had a profound affect on how the average consumer perceives the Internet. The conglomeration of headlines probably set back the e-commerce industry by five years. Java's problems surfaced in 1996, when research at the University of Washington and Princeton began to uncover a series of security holes in Java that could, theoretically, allow hackers to download personal information from someone's home PC. To date, no one has reported a real case of a hacker exploiting the flaw, but knowing that the possibility existed prompted several companies to instruct employees to disable Java in their browsers.

Meanwhile, Netscape and Microsoft began battling in earnest in the much-publicized browser wars. That competition inspired both companies to accelerate the schedules for their 4.0 releases, and the result has been a swarm of bugs, ranging from JavaScript flaws in Netscape's Communicator to a reboot bug in Microsoft's Internet Explorer. Communicator is now in Version 4.04 for Windows 95 and Windows NT, six months after its first release. Internet Explorer 4.01, the first of presumably many bug-fix versions, arrived in December, two months after the initial release of IE 4.0.



2. Deregulation of California utilities has to wait: 1998
Two new electrical power agencies charged with deregulating the California power industry have postponed their plans by at least three months. The delay will let them debug the software that runs the new power grid. Consumers and businesses were supposed to be able to choose from some 200 power suppliers as of January 1, 1998, but time ran out for properly testing the communications system that links the two new agencies with the power companies. The project was postponed after a seven-day simulation of the new system revealed serious problems.

The delay may cost as much as $90 million--much of which may eventually be footed by ratepayers, and which may cause some of the new power suppliers to go into debt or out of business before they even start.



1. The millennium bug: 2000 (Y2K)
For a long time, programmers have saved memory space by leaving only two numeric fields for the year instead of four: 87 instead of 1987, for example. When clocks strike midnight on January 1, 2000, this programming shorthand will make millions of computers worldwide think it's 1900, if their software isn't fixed before then. The so-called year 2000 (Y2K) bug has given birth to a cottage industry of consultants and programming tools dedicated to making sure the modern world doesn't come to a screeching halt on the first day of the next century. Some say that the bug will cause airplanes to fall from the sky, ATMs to shut down, and Social Security checks to bounce. At the very least, the bug is a huge and expensive logistical problem, although most vital organizations said they fixed the critical portions of their systems in time.

Thursday, May 22, 2008

Different ways to shutdown ur pc


Shut it Down with STYLE!!!

There are so many different ways to turn off your Windows XP computer, let's look at some of them:

1. Press Ctrl+Esc key or the Win key and press u two times - the fastest approach.

2. Get the Shutdown utility from Download.com - it add the shut down shortcuts for you. Else create them yourself using approach 4.

3. Create a shutdown shortcut on your desktop. Right click on the desktop, choose New Shortcut and type shutdown -s -t 00 in the area where you are asked to specify the location of the program file. Now you can just double click this icon to turn off the computer. The best location would be your quick launch bar.

4. Press the Win key + R key to open the run window. Type shutdown -s -t 00. [s means shutdown while t means the duration after which you want to initiate the shutdown process].

If some open processes or application won't let you turn off, append a -f switch to force a shut down by closing all active processes.

5. Win+M to minimize all windows and then Alt+F4 to bring the Turn Off computer dialog.

6. Open Windows Task manager (by right clicking the Windows Task bar or Alt+Ctrl+Del) and choose Shut down from the menu. Useful when the Windows are not responding.

7. Open task manager--->click on shutdown--->hold the ctrl key and click on Turn off::::::: pc will be turned off in 3 secs.. fastest method other than hard shutdown

Recover a Corrupted System File

Recover a Corrupted System File



If an essential Windows file gets whacked by a virus or otherwise corrupted, restore it from the Windows CD. Search the CD for the filename, replacing the last character with an underscore; for example, Notepad.ex_. If it's found, open a command prompt and enter the command EXPAND, followed by the full pathname of the file and of the desired destination: EXPAND D:\SETUP\NOTEPAD.EX_ C:\Windows\NOTEPAD.EXE. If either pathname contains any spaces, surround it with double quotes.

If the file isn't found, search on the unmodified filename. It will probably be inside a CAB file, which Win XP treats as a folder. Simply right-drag and copy the file to the desired location. In other Windows platforms, search for a file matching *.cab that contains the filename. When the search is done, open a command prompt and enter EXTRACT /L followed by the desired location, the full pathname of the CAB file, and the desired filename; for example: EXTRACT /L C:\Windows D:\I386\Driver.cab Notepad.exe. Again, if the destination or CAB file pathname contains spaces, surround it with double quotes.


AIN'T-E-VIRUS...

Internet Explorer 7 Keyboard Shortcuts !

Internet Explorer 7 Keyboard Shortcuts:-


Keyboard Shortcuts :

=>CTRL+click (Open links in a new tab in the background)

=>CTRL+SHIFT+click (Open links in a new tab in the foreground)

=>CTRL+T (Open a new tab in the foreground)

=>ALT+ENTER (Open a new tab from the Address bar)

=>CTRL+Q (Open Quick Tabs - thumbnail view)

=>CTRL+TAB/CTRL+SHIFT+TAB (Switch between tabs)

=>CTRL+n (n can be 1-8) (Switch to a specific tab number)

=>CTRL+9 (Switch to the last tab)

=>CTRL+W (Close current tab)

=>ALT+F4 (Close all tabs)

=>CTRL+ALT+F4 (Close other tabs)

Saturday, May 17, 2008

A victim of cyber crime? Here's help...

A victim of cyber crime? Here's help


Have you ever been stalked online, blackmailed or received email threats? If your answer is "yes", you are among the thousands today who are being attacked by Net criminals.

Like other parts of the world, India too is constantly under the threat of these heinous acts. Those of us who use our computers at home without proper security measures are often the easy victims for these crimes.

In the physical world, if a crime is committed, we usually know what to do. Usually the nearest police station comes to the rescue. But what should you do for something you have no real proof, or someone who is not even visible? We bring you some tips which will help you get help quickly.

Cyber stalking or online harassment

This is one of the most common cyber crimes in India. If you are being stalked or harassed, don’t take it as a passing phase. Act fast.

• Avoid all contact with the stalker. Be assertive and diplomatic while communicating with him/her.

• Don’t change your phone number; instead let your answering machine or voice mail take the calls. This will prevent him from adapting ulterior contact strategies.

• Safeguard any evidence of threats like letters, email and voice messages. All this would be needed for legal action.

• Report it to the nearest cyber crime cell.

• If attempts of physical attack take place, file an FIR immediately.

Online Fraud

If you suddenly find out that your money has disappeared from your bank account or there have been discrepancies in your credit statements, your accounts might have been compromised.

• Contact your bank and start the process to ensure that you don’t lose any more money. Ask your bank how you can dispute charges and recover funds.

• Set up a fraud alert with cyber crime cell.

• Watch your credit card and other statements and see if there are transactions that you have not made. This is to ensure that there has been no identity theft.

• File a police report in your area

Spam/Abuse

If obnoxious unsolicited emails fill your inbox every day and refuse to go away, the simple solution is not just to delete them. Effective reporting of spam will ensure prosecution, fining or even jailing of spammers.

Report to: Coalition Against Unsolicited Commercial Email, India (CAUCE India)
Web:
www.india.cauce. org

Hacking

If you find out that you have been hacked, there are broadly two ways to fix the problem.
Rollback: Backup all your important data and reinstall Windows.

System clean: You may also use freely downloadable utilities like Fport, TCP View, etc to clean up the files left by the hacker), but this is not recommended for the novice computer user since it requires a certain degree of technical know-how.

However, it is best to start afresh by reinstalling the operating system so that you can be sure that you machine is void of any infection. Call your service engineer for this. But if you have lost data, or credit card and other critical numbers, it’s best to speak with your banks and get necessary changes done to ensure no money loss occurs.

Cyber crime helplines


a) Superintendent of Police, Cyber Crime Investigation Cell (CCIC); Web: http://cbi.nic. in; Email: cbiccic@bol. net.in

b) Resource Center for Cyber Forensics (RCCF); Web: www.cdactvm. in;
Email:
cyber@cdactvm. in

c) India Computer Emergency Response Team (CERT-In): www.cert-in. org.in


Happy (Hassle free) Surfing....

Thursday, May 15, 2008

Retrieving permanently deleted mails in Outlook

How to retrieve permanently deleted mail in outlook??

--Worried?? Just because you accidentally deleted an important mail from your outlook inbox?

Well here is a way you can get it back.

Don't worry if you have deleted any mails permanently from your outlook inbox. Here is a way you can retrieve your permanently deleted mails.

1. Go to Run by clicking on Start and type in regedit.















2. Now go to HKEY_LOCAL_MACHINE, expand Software.












3. You will find Microsoft there. Expand Microsoft.












4. Expand exchange and then client.











5. You will find Options there. Right click on Options, choose New and click on D Word Value.
















6. Now right click the new Dword Value and rename it to DumpsterAlwaysOn. Note: This is case sensitive.










7. Right click on the DumpsterAlwaysOn and modify the Value data to 1 and click on OK. When you type 1, this means the Recovery deleted Item is on. Also 0 to turn it off.













8. Now open Outlook and click on Tools.

9. Choose 'Recovery Deleted Items'.


Enjoy....

I am a Vegan. PeTA:- People for the Ethical Treatment of Animals


Make your own KFC sign at KentuckyFriedCruelty.com