Pages

New Improved Google Search !!!!!!

Custom Search

Nov 9, 2008

Sagem Mobile Codes

Sagem MC959/940 Select commands' menu and push * Displays a new menu' : Appli : software vers. and battery's voltage Eprom Sim Lock Test LCD: display test , green/red and vibration Sagem MC920 Select commands' menu and push * Displays 5 new menus :
1 APPLI VERSION ( SW) BATTERY (voltage ) 2 PROM (IMEI) 3!!! SIM LOCK (10 digits code requested ) !!! 4- NETWORK (returns : OPTION NOT AVAILABLE) 5- TEST LCD SYMBOL 1 (LCD) SYMBOL 2 (test2 LCD) BLACK (all icons and carachters displayed ) FOR PHOTO (welcome message and time ) VIBRATOR (vibration test )

Philips Mobile Codes

1)*#3333*# Displays the blocking list.
2)*#7489*# Displays the security code.
3)*#06# Displays the IMEI number.
4)*#8377*# Displays the SW info.

Nov 8, 2008

Motorola Hacks

1)Motorola V3688 IMEI *#06#
2)Enhanced Full Rate Codec EFR
3)Enable EFR : [][][] 119 [] 1 [] OK.
4)disable EFR : [][][] 119 [] 0 [] OK

China Mobile Codes

1)Default user code : 1122, 3344, 1234, 5678
2)Engineer mode : *#110*01#
3)Factory mode : *#987#
4)Enable COM port : *#110*01# -> Device -> Set UART -> PS Config -> UART1/115200
5)Restore factory settings : *#987*99#
6)LCD contrast : *#369#
7)Software version : *#800#
8)Software version : *#900#
9)Set default language : *#0000# Send
10)Set English language : *#0044# Send
11)Set English language (new firmware) : *#001# Send
12)Default user code : 1122, 3344, 1234, 5678

Nov 7, 2008

Samgung Hacks Part1

Samsung Secret Codes
1)Software version: *#9999#
2)IMEI number: *#06#
3)Serial number: *#0001#
4)Battery status- Memory capacity : *#9998*246#
5)Debug screen: *#9998*324# - *#8999*324#
6)LCD kontrast: *#9998*523#
7)Vibration test: *#9998*842# - *#8999*842#
8)Alarm beeper - Ringtone test : *#9998*289# - *#8999*289#
9)Smiley: *#9125#
10)Software version: *#0837#
11)Display contrast: *#0523# - *#8999*523#
12)Battery info: *#0228# or *#8999*228#
13)Display storage capacity: *#8999*636#
14)Display SIM card information: *#8999*778#
15)Show date and alarm clock: *#8999*782#
16)The display during warning: *#8999*786#
17)Samsung hardware version: *#8999*837#
18)Show network information: *#8999*638#
19)Display received channel number and received intensity: *#8999*9266#
20)*#1111# S/W Version
21)*#1234# Firmware Version
22)*#2222# H/W Version
23)*#8999*8376263# All Versions Together
24)*#8999*8378# Test Menu
25)*#4777*8665# GPSR Tool
26)*#8999*523# LCD Brightness
27)*#8999*377# Error LOG Menu
28)*#8999*327# EEP Menu
29)*#8999*667# Debug Mode
30)*#92782# PhoneModel (Wap)
31)#*5737425# JAVA Mode
32)*#2255# Call List
33)*#232337# Bluetooth MAC Adress
34)*#5282837# Java Version
35)Type in *#0000# on a Samsung A300 to reset the language
36)Master reset(unlock) #*7337# (for the new samsungs E700 x600 but not E710)
37)Samsung E700 type *#2255# to show secret call log (not tested)
38)Samsung A300, A800 phone unlock enter this *2767*637#
39)Samsung V200, S100, S300 phone unlock : *2767*782257378#
40)#*4773# Incremental Redundancy
41)#*7785# Reset wakeup & RTK timer cariables/variables
42)#*7200# Tone Generator Mute
43)#*3888# BLUETOOTH Test mode
44)#*7828# Task screen
45)#*#8377466# S/W Version & H/W Version
46)#*2562# Restarts Phone
47)#*2565# No Blocking? General Defense.
48)#*3353# General Defense, Code Erased.
49)#*3837# Phone Hangs on White screen.
50)#*3849# Restarts Phone
51)#*7337# Restarts Phone (Resets Wap Settings)
52)#*2886# AutoAnswer ON/OFF
53)#*7288# GPRS Detached/Attached
54)#*7287# GPRS Attached
55)#*7666# White Screen
56)#*7693# Sleep Deactivate/Activate
57)#*2286# Databattery
58)#*2527# GPRS switching set to (Class 4, 8, 9, 10)
59)#*2679# Copycat feature Activa/Deactivate
60)#*3940# External looptest 9600 bps
61)#*4263# Handsfree mode Activate/Deactivate
62)#*2558# Time ON
63)#*3941# External looptest 115200 bps
64)#*5176# L1 Sleep
65)#*7462# SIM Phase
66)#*7983# Voltage/Freq
67)#*7986# Voltage
68)#*8466# Old Time
69)#*2255# Call Failed
70)#*5376# DELETE ALL SMS!!!!
71)#*6837# Official Software Version: (0003000016000702)
72)#*2337# Permanent Registration Beep
73)#*2474# Charging Duration
74)#*2834# Audio Path (Handsfree)
75)#*3270# DCS Support Activate/Deactivate
76)#*3282# Data Activate/Deactivate
77)#*3476# EGSM Activate/Deactivate
78)#*3676# FORMAT FLASH VOLUME!!!
79)#*4760# GSM Activate/Deactivate
80)#*4864# White Screen
81)#*7326# Accessory
82)#*7683# Sleep variable
83)#*3797# Blinks 3D030300 in RED
84)#*7372# Resetting the time to DPB variables
85)#*3273# EGPRS multislot (Class 4, 8, 9, 10)
86)#*7722# RLC bitmap compression Activate/Deactivate
87)#*2351# Blinks 1347E201 in RED
88)#*2775# Switch to 2 inner speaker
89)#*7878# FirstStartup (0=NO, 1=YES)
90)#*3838# Blinks 3D030300 in RED
91)#*2077# GPRS Switch92)#*22671# AMR REC START
93)#*22672# Stop AMR REC (File name: /a/multimedia/sounds/voice list/ENGMODE.amr)
94)#*22673# Pause REC
95)#*22674# Resume REC
96)#*22675# AMR Playback
97)#*22676# AMR Stop Play
98)#*22677# Pause Play
99)#*22678# Resume Play
100)#*77261# PCM Rec Req

Samsung Mobile Hacks Part 2

101)#*77262# Stop PCM Rec
102)#*77263# PCM Playback
103)#*77264# PCM Stop Play
104)#*22679# AMR Get Time
105)*#8999*364# Watchdog ON/OFF
106)*#8999*427# WATCHDOG signal route setup
107)*2767*3855# = Full Reset (Caution every stored data will be deleted.)
108)*2767*2878# = Custom Reset
109)*2767*927# = Wap Reset
110)*2767*226372# = Camera Reset (deletes photos)
111)*2767*688# Reset Mobile TV
112)#7263867# = RAM Dump (On or Off)
113)*2767*49927# = Germany WAP Settings
114)*2767*44927# = UK WAP Settings
115)*2767*31927# = Netherlands WAP Settings
116)*2767*420927# = Czech WAP Settings
117)*2767*43927# = Austria WAP Settings
118)*2767*39927# = Italy WAP Settings
119)*2767*33927# = France WAP Settings
120)*2767*351927# = Portugal WAP Settings
121)*2767*34927# = Spain WAP Settings
122)*2767*46927# = Sweden WAP Settings
123)*2767*380927# = Ukraine WAP Settings
124)*2767*7927# = Russia WAP Settings
125)*2767*30927# = GREECE WAP Settings
126)*2767*73738927# = WAP Settings Reset
127)*2767*49667# = Germany MMS Settings
128)*2767*44667# = UK MMS Settings
129)*2767*31667# = Netherlands MMS Settings
130)*2767*420667# = Czech MMS Settings
131)*2767*43667# = Austria MMS Settings
132)*2767*39667# = Italy MMS Settings
133)*2767*33667# = France MMS Settings
134)*2767*351667# = Portugal MMS Settings
135)*2767*34667# = Spain MMS Settings
136)*2767*46667# = Sweden MMS Settings
137)*2767*380667# = Ukraine MMS Settings
138)*2767*7667#. = Russia MMS Settings
139)*2767*30667# = GREECE MMS Settings
140)*#7465625# = Check the phone lock status
141)*7465625*638*Code# = Enables Network lock
142)#7465625*638*Code# = Disables Network lock
143)*7465625*782*Code# = Enables Subset lock
144)#7465625*782*Code# = Disables Subset lock
145)*7465625*77*Code# = Enables SP lock
146)#7465625*77*Code# = Disables SP lock
147)*7465625*27*Code# = Enables CP lock
148)#7465625*27*Code# = Disables CP lock
149)*7465625*746*Code# = Enables SIM lock
150)#7465625*746*Code# = Disables SIM lock
151)*7465625*228# = Activa lock ON
152)#7465625*228# = Activa lock OFF
153)*7465625*28638# = Auto Network lock ON
154)#7465625*28638# = Auto Network lock OFF
155)*7465625*28782# = Auto subset lock ON
156)#7465625*28782# = Auto subset lock OFF
157)*7465625*2877# = Auto SP lock ON
158)#7465625*2877# = Auto SP lock OFF
159)*7465625*2827# = Auto CP lock ON
160)#7465625*2827# = Auto CP lock OFF
161)*7465625*28746# = Auto SIM lock ON
162)#7465625*28746# = Auto SIM lock OFF

Nov 6, 2008

Free Bsnl Gprs

So configuration of GPRS is more simpler as compared to other networks in case of BSNL.Method 1:sms GPRS to 3733.


Method 2:But you can also configure it manually by select the location of your city or state or district in india by clicking the respective links given below.East Zone West Zone North Zone South Zone - GPRS WAP MMS Method


3:Name BSNL GPRSHomepage http://wap.cellone.inService Type 1
WAPGateway IP 1 10.100.3.2Port 1 9209
Put Domain 1, Service Type 2, Gateway IP 2, Port 2, Domain 2, DNS 1, DNS 2 empty. Timeout: 10 minutesCSD No.1User Name1: pppPassword1: ppp123Put CSD No.2, User Name 2, Password 2, Speed (Bps) 2, Line Type 2 empty. GPRS APN SETTINGSwapwest.cellone.inUser Name pppPassword ppp123Press Done to save settings

i Phone Hacking (latest)

1) *3001#12345#* and tap Call. Enter Field Mode.Field mode reveals many of the inner settings of your iPhone, specifically up-to-date network and cell information.
2) *#06# Displays your IMEI. No need to tap Call.IMEI is the unique identifier for your cell phone hardware. Together with your SIM information it identifies you to the provider network.
3) *777# and tap Call. Account balance for prepaid iPhone.
4) *225# and tap Call. Bill Balance. (Postpaid only)
5) *646# and tap Call. Check minutes. (Postpaid only)These three are pretty self explanatory.
6) *#21# and tap Call. Setting interrogation for call forwards.Discover the settings for your call forwarding. You'll see whether you have voice, data, fax, sms, sync, async, packet access, and pad access call forwarding enabled or disabled.
7) *#30# and tap Call. Calling line presentation check.This displays whether you have enabled or disabled the presentation of the calling line, presumably the number of the party placing the call.
8) *#76# and tap Call. Check whether the connected line presentation is enabled or not.State whether the connected line presentation is enabled or disabled. Presumably similar to the calling line presentation.
9) *#43# and tap Call. Determine if call waiting is enabled.Displays call waiting status for voice, data, fax, sms,sync data, async data, packet access and pad access. Each item is either enabled or disabled.
10) *#61# and tap Call. Check the number for unanswered calls.Show the number for voice call forwarding when a call is unanswered. Also show the options for data, fax, sms, sync, async, packet access and pad access.
11) *#62# and tap Call. Check the number for call forwarding if no service is available.Just like the previous, except for no-service rather than no-answer situations.
12) *#67# and tap Call. Check the number for call forwarding when the iPhone is busy.And again, but for when the iPhone is busy.
13) *#33# and tap Call. Check for call control bars.Check all the usual suspects (voice, data, fax, sms, etc) to see whether barring is enabled or disabled for outgoing.

Nov 5, 2008

Memory Card Password Crack

So there are two types of methods for recovering the password of your memory card with the help of nokia phone.

For Nokia s60 1st and 2nd edition phones.
1. First Install FExplorer in your phone memory.
2. Got to drive C: , you will find a file called mmcstore
3. Send it to your pc directly and open it in notepad or rename the file.
4. At the end of the file you will find your password.For Nokia S60 3rd Phones, Nokia N-Series and Nokia E-Series

There is almost no way yet known to hack the memory card password in case of these types of phone but there is a way to do it some of the s60 3rd edition phones and almost all the E-series phones.
The remote lock option in E-Series phone allws you to unlock your phone by sending a sms.
The only thing you have to do is to activate this feature by going to Tools Settings Security Phone and SIM Allow remote lock menu. The password of your memory card will be your remote lock message.So you have to just send a sms containing your remote lock message that will automatically change your memory card passsword.

Gsm Codes

The following codes are the standard GSM codes for various network services.
Most phones have easier ways to activate them through the menus.
Check the guides for your model.
Call DivertingAll To Activate: * * 21 * NUMBER # [SEND]
To Cancel: # # 21 # [SEND]
To Check: * # 21 # [SEND]
No Answer To Activate: * * 61 * NUMBER # [SEND]
To Cancel: # # 61 # [SEND]
To Check: * # 61 # [SEND]
Unreachable To Activate: * * 62 * NUMBER # [SEND]
To Cancel: # # 62 # [SEND]
To Check: * # 62 # [SEND]
Busy To Activate: * * 67 * NUMBER # [SEND]
To Cancel: # # 67 # [SEND]
To Check: * # 67 # [SEND]
To Cancel All Call Forwarding # # 002 # [SEND]
Diverting Data CallsAll To Activate: * * 21 * NUMBER * 25 # [SEND]
To Cancel: # # 21 # * 25 [SEND]
To Check Status: * # 21 # * 25 # [SEND]
No Answer To Activate: * * 61 * NUMBER * 25 # [SEND]
To Cancel: # # 61 * 25 # [SEND]
To Check Status: * # 61 # * 25 # [SEND]
Unreachable To Activate: * * 62 * NUMBER * 25 # [SEND]
To Cancel: # # 62 # * 25 # [SEND]
To Check Status: * # 62 # * 25 # [SEND]
Busy To Activate: * * 67 * NUMBER * 25 # [SEND]
To Cancel: # # 67 # * 25 # [SEND]
To Check Status: * # 67 # * 24 # [SEND]
Diverting Fax CallsAll To Activate: * * 21 * NUMBER * 13 #[SEND]
To Cancel: # # 21 # * 13 # [SEND]
To Check Status: * # 21 # * 13 # [SEND]
No Answer To Activate: * * 61 * NUMBER * 13 # [SEND]
To Cancel: # # 61 * 13 # [SEND]
To Check Status: * # 61 # * 13 # [SEND]
Unreachable To Activate: * * 62 * NUMBER * 13 # [SEND]
To Cancel: # # 62 # * 13 # [SEND]
To Check Status: * # 62 # * 13 # [SEND]
Busy To Activate: * * 67 * NUMBER * 13 # [SEND]
To Cancel: # # 67 # * 13 # [SEND]
To Check Status: * # 67 # * 13 #[SEND]
Call BarringBefore you can activate these barring services you will need a barring code from your service provider. Call Barring can not be activated if Call Forwarding diverts are already in use.
All Calls To Activate: * 330 * BARRING CODE # [SEND]
To Cancel: # 330 * BARRING CODE # [SEND]
To Check: * # 330 # [SEND]
All Outgoing Calls To Activate: * 333 * BARRING CODE # [SEND]
To Cancel: # 333 * BARRING CODE # [SEND]
To Check: * # 333 # [SEND]
All Incoming Calls To Activate: * 353 * BARRING CODE # [SEND]
To Cancel: # 353 * BARRING CODE # [SEND]
To Check: * # 353 # [SEND]
All Outgoing Calls To Activate: * 33 * BARRING CODE# [SEND]
To Cancel: # 33 * BARRING CODE # [SEND]
To Check: * # 33 # [SEND]
All Outgoing International Calls To Activate: * 331 * BARRING CODE# [SEND]
To Cancel: # 331 * BARRING CODE # [SEND]
To Check: * # 331 # [SEND]
All Outgoing International Calls Except To Home Country To Activate: * 332 * BARRING CODE# [SEND]
To Cancel: # 332 * BARRING CODE # [SEND]
To Check: * # 332 # [SEND]
All Incoming Calls To Activate: * 35 * BARRING CODE # [SEND]
To Cancel: # 35 * BARRING CODE # [SEND]
To Check: * # 35 # [SEND]
All Incoming Calls When Outside Home Country To Activate: * 351 * BARRING CODE # [SEND] To Cancel: # 351 * BARRING CODE # [SEND]
To Check: * # 351 # [SEND]
Canceling All Call Barring # 330 * BARRING CODE # [SEND]
Call WaitingTo Activate: * 43 # [SEND]
To Deactivate: # 43 # [SEND]
To Check: * # 43 # [SEND]
Calling Line IdentityOutgoing To Activate: * 31 # [SEND]
To Deactivate: # 31 # [SEND]
To Check: * # 31 # [SEND]
Incoming To Activate: * 30 # [SEND]
To Deactivate: # 30 # [SEND]

Nov 4, 2008

China mobile PC suite (100% popular)

hi i m posting the link from which u can download the pc sync manager and use it with china mobile
the link is
http://rapidshare.com/files/90968231/ChinaPhone_PCSuite.rar

China mobile USB drivers

the China mobile Usb drivers are also normally not avialable so i m posting the linkk to download it and install it in ur PC using mycomputer/properties/hardware/devics manager/mt6227 /install drivers


the link is
http://rapidshare.com/files/90975068/USB_Driver_For_MTK.rar

Free idea GPRS

This is the new trick for the user of idea cellular.
cell phone or pc/laptop.....Before starting the detailed procedure these things described as
1... you must have no connection !
2... you must not have any active plans !
3... you must have prepaid connections !( USING OF THIS TRICK INPOST PAID WILL LEAD TO YOU HIGHER AMOUNT OF BILL )
4...you must have S60 phone(FOR CERTAIN S40 DEVICES THIS TRICKWORKS)
5... THIS TRICK HAS BEEN TESTED SUCCESSFULLY IN NOKIA AND SONYERICSSON DEVICES
NOW COME TO THE PROCEDURE TO GET FREE INTERNET:From your idea cell phone type GP13 and send it to 4444.now you will receive that your GP13 pack will be activated within24 hours...now wait for 12 to 16 hours..now send the same sms to 4444..you will receive that your request has been already registered.now again after 24 hours you will find that your GP13 pack hasbeen activated...!!!
BUT thats not a trick...yes because you have been have beencharged 13 rs because of activation of GP13..real trick starts now..After successfull activation of GP13 pack just send NOGP13 to4444.
(4444 No is free of charge)you will receive that your GP13 pack will be deactivated within24 hours..now after just 10 to 12 hours of sending dectivation sms againsend GP13 to 4444..now its enough ...you have completed your all steps to get freeinternet..its because due to last activation sms after deactivation smssystem will be hacked!!!System isnt able to take decision what todo!!now after some time of sending sms for activation just rebootyour system from file explorer..now restart your device/cell..you are able to surf free..but note that if you are using cell phone than use opera mini oruc web browser and if you are using pc/laptop than use smart webbrowser or opera 9.27.if you wish to use proxy for your opera than you must have to usethe proxy given below.....
1.i.p.Adderss: 12.148.192.178Port :1080(common for all)
2.i.p.Adderss: 63.127.192.178
3.i.p.Adderss: 199.105.112.152
4.i.p.Adderss: 199.105.112.163
5.i.p.Adderss: 12.148.162.37.......

Nov 3, 2008

Free 2048 char SMS Via GPRS

Youcan send unlimited free sms from Cellity freeSMS.
Cellity offers a freeSMS service. Sending and receiving short messages results in no feesthrough cellity.
Also your provider will not charge for any costly SMSanymore when you use this freeSMS tool, only the cost of data traffic(via GPRS) if any & it very very less than normal SMS.
And the bestpart: It works all over the world, with any cellphone contract.
No newphone number, no new SIM card, no new contract required!
Messages with only 160 characters? That was yesterday!
When writing an SMS with cellity freeSMS you can send up to 2,048 characters!
Keep track of every conversation!
Group SMS are also free!
Doyou want to send one SMS to many different receivers?
A fast partyinvitation?
Or a quick holiday greeting?
Using cellity freeSMS you candesignate as many receivers as you wish – with only one message sentand no extra costs.

First of all download the messenger softwarefrom here or visit www.cellity.com then after a verity of your phonenumber you can use it.
Send Free SMS & MMS (for Airtel In only) from your mobile phone:
Free SMSa.
Firstly activate the free SMS on your Airtel & than you’ll get 400A2A free SMS.
Now deactivate this service after 7 days & then againrestart this on very next day.
You’ll get 1200 free SMS A2A.b.
Other trick is that go to Message Setting -> Text Message ->Profile Setting & than change Message Centre Number to +9810051905.
Remember this FREE SMS centre number works on Few Airtel numbers only.Enjoy free SMSing…

Free MMS via Airtel

Free MMSAirtel live activated SIM.
Go toMessage Setting - MMS Setting & than change APN Address or I.PSERVER Address from airtelmms.com to airtelfun.com.
If MMS sendingfailed than dial this CODE - *#1921135518# dial this will make tosending FREE your MMS.
Enjoy free MMSing….

Nov 2, 2008

Turn Your Mobile Camera to webcam

Guys dont have a webcam and wanted to chat with friends on yahoo and skype

I have a solution

If you have a s60 nokia phone with camera you can use it like your webcam
The smart cam application connect the PC to your mobile and it will syncronize your mobile with pc so u can use your mobile camera as a webcam and have a video conferencing.

Basic features

Basic outline features of Smart Cam:
1. Smart Cam is basically developed for the Symbian series 60 phones with Bluetooth connectivity using which the integration of your phone cam with your pc is made easy.
2. What you need to get started is, just install Smart Cam in your pc and in your phone also. You need to have the application installed in both the terminals.
3. Connect the phone to pc via Bluetooth using the Smart Cam application interface.
4. Once you have connected to the pc what you need to do is to synchronize the phone with your pc so that you can easily make it function as your pc webcam.
5.Smart Cam works very well with Skype and yahoo messenger where you can video chat with your friends using your phone’s cam.


Download Smart cam Click the link: http://www.symbian-freeware.com/download-smartcam.html

Nov 1, 2008

Hide Your Phone number While Calling

Most of you want to call someone while hiding your own phone no identity

so i am publishing the trick for hiding your ph no.

If you want to hide/show your phone number when calling, put one of these codes below in front of the number that you are going to call.
(*#30# / *#31# or *31# / #31# ) Works on most of the networks.

enjoy

Send Fake Mail using SMTP

friend all of us want to send fake mail with others mail id
here i m posting the method which is used to send the fake mail using the Simple Mail Transfer Protocol(SMTP)

SMTP is the protocol which is used to send mail over the internet
when we login to our account and send a mail the smtp protocol will send it to the smtp server which will send it to the pop3 server and then it gets to the receiver email account.

The main bug in this system is that the SMTP server access dosent need any authentication,means when u want to send data to any of the email account you need not to provide the your identification or the email id and password you can just login with any email id and send email.

But the receiver has to give his e mail id and password as the pop3 server needs a authentication.

thus using this bug even a leyman can send a fake mail with any user id and fool the receiver.This kind of java script are alraedy available on net so u can get it from any where,
Now the main crux here is that the mail can be trace and the ip can br known to the tracer,now a days terorist are using such bugs to send email and may be traced.So please dont use this method for any destructive or negative purpose.

As per the indian laws it may be punishable to send fake mail via internet bus there is no such juridiction in law for sending fake mail through GPRS and this the loop hole.So once you got the site from web for fake mail use it to send fake mail via GPRS and enjoy.

Oct 29, 2008

Tricks For Cache Setting

Windows has the same cache setting for all machines. Most often, this is not optimal. As a result, the system exhausts all its free memory and appears very sluggish. You can get the true value of your system by optimising the cache to your system's needs.

* In Windows 9x/Me, you have to modify a system file. A software called Cacheman will do this for you. In Windows NT/2K, you should change the I/O page size. To do this, you can use Xteq Systems X-Setup. Choose the appropriate setting under System » Memory.
The above-mentioned programs do not stay in memory all the time. They just simply modify a setting under which Windows works.

Oct 28, 2008

Tricks For Disk Partitions

* Primary Partitions, Extended Partitions and Logical Partitions
A hard disk can have a maximum of only 4 partitions, which are called PRIMARY PARTITIONS. This limit was thought to be sufficient in the early days of the PC. To go over this limit, in place of a primary partition, a special kind of partition called EXTENDED PARTITION is used. Inside this EXTENDED PARTITION, any number of smaller partitions called LOGICAL PARTITIONS can be created.

* Multiple OS and partitions: Some people recommend just one primary partition and the rest inside an extended partition. But, some OS like the Linux require a primary partition for proper booting up. Others, such as Windows 2000 will be happy to get installed in a logical partition while Windows 95/98/Me installs in the first primary partition.

* My recommendation is two primary partitions (one for Win 9x/Me and one for Linux) with the rest inside an extended partition.

* Partitioning tool: Windows 9x/Me supplies a partition tool called FDISK. It does not recognize partitions created by Linux installations. So, use something like Ranish Partition Manager.

* Boot loader: If you have multiple operating systems, you might want to use a GUI-based boot loader such as Extended Operating System Loader (XOSL)

Tricks For Device Manager

3.) Tips ∓ Tricks For Device Manager

* Keyboard shortcuts: There may have been times when your mouse was not detected and you had a hard time getting around the device manager. Here are the navigation keys with Device Manager. If you are in the desktop, press the TAB key repeatedly until My Computer is selected. Then press the context MENU key, which is between the left Ctrl key and the Windows Key. This opens up the context menu for the My Computer. Now select Properties from this menu. Now you see the System Properties window. This has several tabs, one of which is the Device Manager. Press Ctrl+TAB repeatedly to move to Device Manager. Now you see all the devices listed. Press TAB to move to them. To open up any particular device, press the RIGHT ARROW and to shrink it up press LEFT ARROW. To open up the properties of any particular device, press ALT+ENTER or the MENU key.

* DMA: Most of the hard disks that have come in the past few years support DMA. Make sure this option is checked in the Disk Drive Properties.

* Autostart CDs: If you do not want CDs to autostart as soon as it is inserted, then uncheck the box Autostart Notification. Without this setting, if you do not want to autostart with a particular CD, then hold down the SHIFT key for some time as you insert the CD.

* Ports: If you have a 56 kbps modem, then set its port speed to 1,15,200. This can be set in the Communication Port Properties

* Modem: Most modems that are available in India use American-made chipsets. They do not recognise Indian dial tones. So, set the modem to blind dial using an initializing string ATX3. Modems usually come with a manual that has a list of AT commands you can use with your modem.

Oct 27, 2008

Tricks For BIOS

* Standby BIOS: After you had just assembled or just bought your PC, make sure to take a copy of your BIOS in a floppy. Do not forget to copy the software program required to flash the BIOS with it. For instructions regarding this, refer to your motherboard manual or the manufacturer's website.

* Do not detect absent IDE drives: As mentioned earlier, you can connect 4 IDE devices to your MB. During bootup process, the BIOS will try to detect all of them. If you have just a hard disk and a CD drive, you can set the BIOS to detect just these devices and bypass checking the absent ones. This will save some precious microseconds when booting up.

* Supervisor password: To prevent your BIOS settings from being changed by anyone else, set a Supervisor password in the BIOS and do not set the user password.

* User password: If you want to prevent access to anyone else, then set the User password.

* Remote access: You can make a telephone call to your PC from outside or send a fax to it even when the machine is switched off. This is possible with ATX standard cabinets. In the power settings section of the BIOS, allow the PC to wake up on LAN or external modem act. Keep the power supply to the ATX and the modem on, while the system itself is powered off. When the modem receives a call, it will wake up the power supply and boot up the PC to handle the call.

* Boot sequence: After you have installed your OS, set your hard disk first in the boot-up sequence with the CD drive and the floppy following it in that order.

* Quick Power On Self Test: Keep this enabled and save on boot-up time.

* Boot Up Floppy Seek: Keep this disabled.

* BIOS updates: Check the motherboard's website or that of the BIOS manufacturer for BIOS updates and use the BIOS update program mentioned above to flash the BIOS. Many problems faced initially with hardware are likely to be solved after the updates.

Tricks For Hardware Configuration

A well-configured PC by itself offers great performance. The key lies in the choice of the components and their arrangement.

* Choice of CPU
My suggestion for a CPU would be one from AMD. I choose AMD for the following reasons
1. Price-to-performance ratio: Athlon processors beat the best from the Intel's equally clocked processors. Besides, they are cheaper than Intel's. Because they support DDR-RAM, the overall system cost is lower.
2. True FSB speed of 200 MHz: Though Intel advertises an FSB of 800 MHz, its true FSB is only 200 MHz, which is the same as the latest AMD Athlon XP processors. This is because not all subsystems of a PC can work at 800 MHz.
3. DDR-RAM support: DDR-RAM allows two data fetches per clock cycle. The newer dual-channel DDR-RAM does four data fetches per clock cycle, which is the same number as RDRAM. RDRAM however has higher latencies. Besides, you cannot upgrade RDRAM easily. If you add another module of RDRAM to an existing one, you will only increase the total latency because RDRAM is serial in nature. Compared to this, because DDR-RAM is parallel in nature, you can easily add additional modules of DDR RAM as and when you have the money, and expect the throughput to multiply. Because RDRAM technology is proprietary and difficult to make, it is expensive. DDR-RAM on the other hand is cheaper because its specification is made by a nonprofit standards organization. Even Intel seems to moving towards DDRRAM, as many Pentium-4 chipsets now support DDR-RAM.
4. HyperTransport: This technology was developed by AMD to upgrade the PCI bus of its limited capacity and all its other deficiencies. HyperTransport has been used in nVidia's nForce2 chipset. It beats all other PCI-based systems in terms of performance.

* Choice of motherboard
There was a time when integrated motherboards meant lower performance and limited functionality. Not anymore. With the nForce and the forthcoming chipsets from ATI, this feeling will definitely undergo a change. The nForce currently supports not only AMD processors, DDR-RAM, and HyperTransport, but also carries a GeForce GPU and a Dolby® 5.1 onboard sound processor. Other things to look for in a motherboard would be support for ATA 133, USB 2.0, AGP 8x, CNR, enough memory slots, space for larger heatsink/fan combination, etc.

* IDE drives setup: A motherboard usually has 2 IDE connectors each capable of connecting 2 devices in a master/slave combination for a total of 4 devices. If you have just a single hard disk and a single CD drive, set them as separately as masters in each IDE connector. If you have a CD drive and CD-RW drive, set the CD-RW as the master and the CD drive as its slave.

* ATX (cabinet): When buying the ATX, make sure it supports your CPU/motherboard/AGP combination. Intel Pentium IV processors and motherboards require a special kind of ATX that conforms to their standard (ATX 2.03). Do not buy an ATX with less than 300 W power supply. Also, make sure the cabinet has provisions for two extra fans (one in the front and one in the back). The power supply comes with a fan, which also tries to takes some hot air off the CPU through a grill placed just above the CPU. This grill needs to big enough and properly placed and spaced out to provide effective cooling. Another thing to look for in an ATX is a socket for the monitor. Some cabinets do not come with them. So, these have to be connected directly to the mains and cannot be switched off with the rest of the system when the PC is shutdown.
With Windows Me/2000/XP, there is an option in Control Panel » Power Options called Hibernate. Hibernate is used to quickly shut down the PC and restart it with the same programs you had kept open when you shut down the system. This option is possible with ATX cabinets only. Hibernate does not function properly if you have devices that do not use Win32 ® Driver Model (WDM) drivers.

* COM ports: If you are using a serial mouse, connect it to the COM1 port as the OS first checks this port for a mouse. You can connect your modem to the COM2.

* CNR port: This port (known as Audio Modem Riser or AMR in older motherboards) can be used to add a specially made low-cost peripheral replacement. The replacement is far cheaper than a separate sound card or modem.

* Fans: If your cabinet allows it, install additional fans for extra cooling.

* Dust: Remove dust regularly from the insides of your cabinet and prevent them from forming a coating over the motherboard and other parts.

* Driver updates: Check the websites of the various hardware vendors for updates and install them. Most important among them would be those of the motherboard chipset.

2. Tips ∓ T

Tricks For Hardware Configuration

A well-configured PC by itself offers great performance. The key lies in the choice of the components and their arrangement.

* Choice of CPU
My suggestion for a CPU would be one from AMD. I choose AMD for the following reasons
1. Price-to-performance ratio: Athlon processors beat the best from the Intel's equally clocked processors. Besides, they are cheaper than Intel's. Because they support DDR-RAM, the overall system cost is lower.
2. True FSB speed of 200 MHz: Though Intel advertises an FSB of 800 MHz, its true FSB is only 200 MHz, which is the same as the latest AMD Athlon XP processors. This is because not all subsystems of a PC can work at 800 MHz.
3. DDR-RAM support: DDR-RAM allows two data fetches per clock cycle. The newer dual-channel DDR-RAM does four data fetches per clock cycle, which is the same number as RDRAM. RDRAM however has higher latencies. Besides, you cannot upgrade RDRAM easily. If you add another module of RDRAM to an existing one, you will only increase the total latency because RDRAM is serial in nature. Compared to this, because DDR-RAM is parallel in nature, you can easily add additional modules of DDR RAM as and when you have the money, and expect the throughput to multiply. Because RDRAM technology is proprietary and difficult to make, it is expensive. DDR-RAM on the other hand is cheaper because its specification is made by a nonprofit standards organization. Even Intel seems to moving towards DDRRAM, as many Pentium-4 chipsets now support DDR-RAM.
4. HyperTransport: This technology was developed by AMD to upgrade the PCI bus of its limited capacity and all its other deficiencies. HyperTransport has been used in nVidia's nForce2 chipset. It beats all other PCI-based systems in terms of performance.

* Choice of motherboard
There was a time when integrated motherboards meant lower performance and limited functionality. Not anymore. With the nForce and the forthcoming chipsets from ATI, this feeling will definitely undergo a change. The nForce currently supports not only AMD processors, DDR-RAM, and HyperTransport, but also carries a GeForce GPU and a Dolby® 5.1 onboard sound processor. Other things to look for in a motherboard would be support for ATA 133, USB 2.0, AGP 8x, CNR, enough memory slots, space for larger heatsink/fan combination, etc.

* IDE drives setup: A motherboard usually has 2 IDE connectors each capable of connecting 2 devices in a master/slave combination for a total of 4 devices. If you have just a single hard disk and a single CD drive, set them as separately as masters in each IDE connector. If you have a CD drive and CD-RW drive, set the CD-RW as the master and the CD drive as its slave.

* ATX (cabinet): When buying the ATX, make sure it supports your CPU/motherboard/AGP combination. Intel Pentium IV processors and motherboards require a special kind of ATX that conforms to their standard (ATX 2.03). Do not buy an ATX with less than 300 W power supply. Also, make sure the cabinet has provisions for two extra fans (one in the front and one in the back). The power supply comes with a fan, which also tries to takes some hot air off the CPU through a grill placed just above the CPU. This grill needs to big enough and properly placed and spaced out to provide effective cooling. Another thing to look for in an ATX is a socket for the monitor. Some cabinets do not come with them. So, these have to be connected directly to the mains and cannot be switched off with the rest of the system when the PC is shutdown.
With Windows Me/2000/XP, there is an option in Control Panel » Power Options called Hibernate. Hibernate is used to quickly shut down the PC and restart it with the same programs you had kept open when you shut down the system. This option is possible with ATX cabinets only. Hibernate does not function properly if you have devices that do not use Win32 ® Driver Model (WDM) drivers.

* COM ports: If you are using a serial mouse, connect it to the COM1 port as the OS first checks this port for a mouse. You can connect your modem to the COM2.

* CNR port: This port (known as Audio Modem Riser or AMR in older motherboards) can be used to add a specially made low-cost peripheral replacement. The replacement is far cheaper than a separate sound card or modem.

* Fans: If your cabinet allows it, install additional fans for extra cooling.

* Dust: Remove dust regularly from the insides of your cabinet and prevent them from forming a coating over the motherboard and other parts.

* Driver updates: Check the websites of the various hardware vendors for updates and install them. Most important among them would be those of the motherboard chipset.

2. Tips ∓ T

Oct 26, 2008

Tricks For Outlook Express

Outlook Express is free and comes bundled with IE. You can integrate your HotMAIL account with it.

* Save some space by unchecking Contact, Outlook Bar, and View Bar in the Window Layout Properties. This is chosen by selecting Layout from the View menu.

* Implementing Spam Filters For POP Accounts: Create two folders in your mail client - Filtered Inbox and Spam. Create the following four Message Rules in Outlook Express (Tools » Message Rules » Mail). Use your old messages as a guide while picking the words for your filters. Check the Spam folder once in a while for any false-positives. If you find any spam among the flagged messages in the Filtered Inbox, then update the filters in the third rule with new words.

Mail Rule #1: Mail From Known Contacts
Where the From line contains 'friendname' or 'contact@emailaddress.com'
Move it to the Filtered Inbox folder
and Stop processing more rules

Mail Rule #2: Mail Not Addressed To Me
Where the To or CC line does not contain 'your@emailaddress.com'
Move it to the Spam folder
and Stop processing more rules

Mail Rule #3: Word filters on From, To, ∓ Subject lines
Where the From line contains 'debt' or 'enlargement' or 'teens' or 'viagra'
or Where the Subject line contains 'debt' or 'enlargement' or 'teens' or 'viagra'
or Where the To line contains 'debt' or 'enlargement' or 'teens' or 'viagra'
Move it to the Spam folder
and Stop processing more rules

Mail Rule #4: Suspect Mail
For all messages
Move it to the Filtered Inbox folder
and Flag it
and Stop processing more rules

* Integrating HotMAIL: You can integrate your HotMAIL account with Outlook Express. Just go about as you would do with adding a POP account. After you enter your HotMAIL address, OE will automatically identify it as a HotMAIL account and pre-fill the E-mail Server Names details. Click Next enter the userid and password. When you are done, OE will ask if you want to download folders for that account. Here, choose Yes. After the folders have been downloaded, you can use it like you would use a POP mail account except that you will not be able to use the Message Rules (available under the Tools menu) on this account.

* Handling Junk Mail ∓ Viruses In HotMAIL: If you get a lot of junk mail, then through the HotMAIL website activate the bulk mail folder. Create appropriate mail filters to prevent junk from landing into your inbox. Despite this, you might get junk mail and sometimes viruses. To handle these annoyances, you have to configure OE to download only mail headers. Right click on Bulk Mail and Inbox folders, and follow this - Synchronization Settings » Headers Only. Keep the Preview option off by clicking on its button on the toolbar. Some viruses get activated when Preview is on. Now, connect to the net and receive your mail. Then, read the from addresses and subject lines. Leave mails that appear to be viruses or spam alone. Mark the good ones by clicking under the column Mark for Offline. After this, once more receive your mail. Now, the messages that you had marked alone will be downloaded in full. The viruses and junk would not have been downloaded. Sometimes, your well-meaning contacts might be sending you viruses unknown to them. So, instead of opening the attachments, save them to your desktop. If the attachments contain any viruses, your antivirus should kick in at this time. I am using AVG antivirus and it does a pretty good job of handling viruses.

Email Headers: Spammers and viruses do a lot of spoofing when it comes to leaving traces. Check the screenshot for the header of a virus-laden mail that I received. Both the to and from address belong to me but the sender was actually jmcneill@stx.rr.com. By reading the header, it becomes clear from which ISP this guy has been using. In this case, RoadRunner.com or rr.com. By sending a mail to abuse@WhicheverISP.com, you will be able alert the ISP provider of the nuisance. When contacting the ISP, make sure you send them a plain text message along with the Internet header of the offending email. Without the header, they will not be able to take any action. To read the email headers, keep the Preview off. Right click on the message and select Properties » Details.

Most viruses usually attack the Address Book. The virus reads the addresses stored in the Address Book and mails a copy of the virus to all the contacts, sometimes along with a file found in your machine. Some viruses forge the to and from addresses. So, it may not be always be right to yell at your friend for sending viruses. It is best not to keep any contacts in the Address Book not just in the interest of your contacts, but also in the interest of your own privacy.

People who send junk mail or spam have large databases of email addresses. They are paid by companies that sell something. All current measures against spam are devoted against spammers rather than the spam sponsors. Spam sponsors are at the root of this evil. Is there a way to stop this group of low life? Read Reverse Spamming or How To Fight Spam With Spam.

* Archiving HotMAIL messages: When you import messages from a backup copy of the message store folder, your HotMAIL messages will not be imported. So, create two folders under Local Folders called Archived Inbox and Archived Outbox. Copy the messages from your HotMAIL folders to these folders appropriately. Before you reinstall Windows or something drastic as that, create a backup copy the store folder in some other location. The store folder's location can be found by going to Options » Maintenance » Store Folder. After you are done with your reinstall, ask OE or whichever mail client you are using to import the messages from this folder. Now, your HotMAIL messages will be imported.

* Options: To change the various settings of OE, choose Options in the Tools menu. If you have a dial-up account, then under the General tab, uncheck all the check boxes. Under the Send tab, uncheck the Send messages immediately. Under the Compose tab, under Font Settings choose the Verdana 9pt font or anything else that you might fancy. Under the Signatures tab, create different signatures for different accounts or one for all accounts. If you are in India, then setting the dictionary to English (United Kingdom) in the Language section of the Spelling tab will prevent conflicts with American spelling.

* Blind Carbon Copy (bcc): Not many people know the advantages of bcc. When an email is cc'd to different people, each one of them get to know the other ids. Many people would be annoyed if their ids are distributed around in a careless fashion. Also, many a time, people just cc all others when replying. So, when broadcasting a message leave the "To" and "cc" fields empty and instead fill up the "bcc" with the addresses. To send mails using the bcc option in Outlook Express, choose View » All headers in the New Message window.

Tricks For Browsing

* Use Opera, if you are looking for speed and its tabbed interface. Use Internet Explorer, if you do a lot of offline browsing. Internet Explorer is also good for O2 phones equipped with web browsers. Netscape 7, like Opera, allows tabbed browsing, ie., opening multiple web pages in a single window under different tabs. Besides, it has numerous add-ons such as Mail, AOL IM, Winamp, etc. The only thing that Netscape 7 lacks is IE's panache for offline browsing with the History side-pane. In Opera, settings can be changed by choosing Preference under the File menu. To get a tabbed interface for new windows, check Open windows inside Opera workspace under Windows. In the same place, select Open pop-up windows in the background under Browser Windows. To use the cache effectively, check Never under History and cache. Press F5 to manually refresh pages.

* To save on the time spent online, start your browser along with Outlook Express. Open as many windows in the browser and enter the urls of the sites you need to visit. Do not click on Go or press Enter. Now start your dialer. Once you are connected, ask OE to send and receive messages. As the messages are being received and sent, go the browser windows and click on the Go buttons. When OE finishes its job, disconnect.

* Do not type your messages online. If you have an HotMAIL account, integrate it with OE. Type and read your messages offline. If you are using other accounts such as Yahoo, type them first in Notepad when you are offline. Then, when you go online, in the Compose section, cut and past the message.

* You can send messages to machines running the Messenger service (Windows NT/2000/XP) by using the command net send
message from the MS-DOS prompt. To send a message to yourself, type net send 127.0.0.1 hello.

Oct 20, 2008

How to Bypass BIOS Passwords

Before attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:

Using a manufacturers backdoor password to access the BIOS

Use password cracking software

Reset the CMOS using the jumpers or solder beads.

Removing the CMOS battery for at least 10 minutes

Overloading the keyboard buffer

Using a professional service

Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.

Oct 19, 2008

registry hack which will allow you to see your opponents' cards

Launch REGEDIT.EXE and navigate to HKEY_CURRENT_USER Software Microsoft Windows CurrentVersion Applets Hearts.

NOTE: You may have to create the Hearts key under Applets

In the right-hand pane, create a new String Value. Immediately rename it to "ZB" (without the quotes); give it a value of "42" (again, sans quotes).

The next time you're in a game of Hearts, press CTRL + SHIFT + ALT + F12.

Shutting down Windows the fastest way

1. Start -> Run
2. Type rundll.exe user.exe,exitwindows

Oct 18, 2008

Display a banner each time Windows boots

1. Start -> Run
2. Type regedit
3. Go to the key HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionWinLogon
4. Create a new string value in the right pane named LegalNoticeCaption and enter the value that you want to see in the menubar
5. Create a new string value and name it LegalNoticeText. Modify it and insert the message you want to display each time Windows boots

Oct 17, 2008

Hide Drives in My Computer

Open your registry and find or create the key below.

The "NoDrives" value uses a 32-bit word to define local and network drive visibility for each logical drive in the computer. The lower 26 bits of the 32-bit word correspond to drive letters A through Z. Drives are visible when set to 0 and hidden when set to 1.

If your not happy working in Hex, add these decimal numbers to hide the drive(s):

A: 1, B: 2, C: 4, D: 8, E: 16, F: 32, G: 64, H: 128, I: 256, J: 512, K: 1024, L: 2048, M: 4096, N: 8192, O: 16384, P: 32768, Q: 65536, R: 131072, S: 262144, T: 524288, U: 1048576, V: 2097152, W: 4194304, X: 8388608, Y: 16777216, Z: 33554432, ALL: 67108863

For example to hide drive A and drive D, you would add 1 (A) + 8 (D) which means the value should be set to "9".

To disable all the drives set the value to "67108863".

Restart Windows for the change to take effect.

Oct 16, 2008

Top 8 Tips for Wireless Home Network Security

1) Change Default Administrator Passwords (and Usernames)

Changing the default password is important because everyone that purchases the same Wireless access device, knows your password.

2) Turn on (Compatible) WPA / WEP Encryption
By default, your Wireless device comes without the encryption enables. WPA / WEP are security programs that forced your computer to provide an encrypted password before you are allowed access to the wireless access point.

3) Change the Default SSID
SSID is the network name of your wireless network; most people leave the default name, such as, Linksys or NetGear. By changing the name, intruders have a more difficult time identifying your system and use known vulnerabilities. (And of course, use the unchanged default password.) One mistake people make is naming their home network their family name and or address. When cruising a neighborhood of wireless devices, its always scary to see Smithfamily201Elm.

4) Disable SSID Broadcast
In Wi-Fi networking, the access point or router typically broadcasts the network name (SSID) over the air at regular intervals. This feature was designed for businesses and mobile hotspots where Wi-Fi clients may come and go. In the home, this feature is unnecessary, and it increases the likelihood an unwelcome neighbor or hacker will try to log in to your home network.

5) Assign Static IP Addresses to Devices
Most home networkers gravitate toward using dynamic IP addresses. This means that the IP Address, (the IP Address is needed to participate on a network.) is typically assigned automatically. A dynamic IP address on an unsecure system can also supply a hacker with a IP Address.

6) Enable MAC Address Filtering
Each piece of Wi-Fi gear possesses a unique identifier called the "physical address" or "MAC address." Access points and routers keep track of the MAC addresses of all devices that connect to them. Many such products offer the owner an option to key in the MAC addresses of their home equipment that restricts the network to only allow connections from those devices. Do this, but also know that the feature is not so powerful as it may seem. Hacker software programs can fake MAC addresses easily.

7) Turn Off the Network During Extended Periods of Non-Use
The ultimate in security measures for any wireless network is to shut down, or turn office your wireless access point when you are not using. You are the most vulnerable at work or asleep, and mischief minded people know it.

8) Position the Router or Access Point Safely
Wi-Fi signals normally reach to the exterior of a home. A small amount of "leakage" outdoors is not a problem, but the further this signal reaches, the easier it is for others to detect and exploit. Wi-Fi signals often reach across streets and through neighboring homes. When installing a wireless home network, the position of the access point or router determines it's reach. Try to position these devices near the center of the home rather than near windows to minimize this leakage.

Oct 15, 2008

NSeries Problem with phone Memory Shows "Memory Full, delete some data"

Most NSeries User experiencing with Phone memory. One of my friend scrap me few days back in my Nokia Hacker orkut Community

am using N73 Music Edition since last almost 1 and half year. I am facing an issue with phone memory from last 3-4 Months. Suddenly I get an error "Memory Full, delete some data" for phone memory. When I check Phone memory details, it shows me 44 MB used and only few KBs left. Even If I make a total of all used phone memory, it never goes above 1 MB. I understand when everything is OK and if we check phone memory, it will show me around 33 MB free memory and 11 MB used memory which could be because of OS on phone.

I am wondering why I suddenly my phone memory goes upto 44 MB even if there's nothing that can make phone memory to reach upto 44 MB.

Did anyone face this issue ever ? If yes then please let me know the solution for the same.

At present I found a workaround to this problem. When I get this memory full error, I clear the log from Application -> Log -> Settings. I make it no log or 1 day log and then restarts my cell. It resolves the problem

The Solution is here

Why the phone shows that full memory even though the file are around some 15 to 19 MB…

The real problem is with application called “LIFEBLOG”…. I really hate this application since when I bought N73… When ever we taking photo or sending message or receiving message… this application take a copy and store in his data base. that’s why we are experiencing these problem…

The solution is

First you should have minimum of 150 KB free memory in your phone… its enough to open
the Application

Then open the Application-->Lifeblog-->option-->settings--> item types--> unmark all the items… then restart your mobile…. whiles start up… the lifeblog application will clean up the database and your phone memory will back to normal….

Oct 12, 2008

15 General Tips and Tricks for Nokia Users

Tips 1 : Do u know how to use the edit button (abc or pencil button)?

Heres how... In the inbox for example; u wanna delete multiple sms, simply hold the edit button, scroll down, and then, press c to delete the marked sms. The edit button can also b used to copy and past text in sms, simply hold it and scroll across, choose copy. Pretty good for placing song names in ngages

Tip 2 : Shit happens, on a smartphone, its inevitable u do something wrong, and tis calls for a format of fone. To format the fone, press *#7370#, then enter the lock code, which is the sec code of the fone. NOTE: batt must b full, else if format is disrupted by low batt, consequences will b disatrous.I heard the code *#7780# works too, pretty much the same i tink.

for 6600 users, to format the fone, theres an alternative way. Press and hold <3>, <*> and Call (Send) buttons, then power on fone, keep holding on the 3 buttons, till u come to a format screen. This method ONLY works on 6600, and need not enter the sec code. BUT sec code would be reset to default 12345.

Tip 3 : TO NGAGE USERS; Did u know u can install .sis files simply using the cable given? Juz plug it in, place the .sis file anywhere on e: (the mmc), not in any folders, root of e:, disconnect, then look for it in manager.


Tip 4: Save on battery and system memory being used by regulary checking the task manager which can be accessed by holding down the menu button!!

Tip 4a: Set the screen saver to a short time out period to prolong battery life.
Tip 4b: Avoid restarting the phone, or repeatedly turning it on and off. This helps increase battery life.

Tip 5: Type *#06# to display your IMEI serial number, very valuable for the unlocking your phone to other sim cards

Tip 6: Type *#0000# to view which firmware version you are running


Tip 7: If you would like to avoid being "blue jacked", keep bluetooth turned off, or set your phone's visibility to hidden.

Tip 8: Don't want to carry a watch and a phone? Set the screen saver to show date and time, then you can ditch the watch.

Tip 9: Save memory when installing apps, by installing over bluetooth. This can be done using the nokia phone suite and a bluetooth serial connection. Only works with .SIS files, so java still has to be sent to the phone, but will save space when using .SIS files.



Tip 10: Operator logos
Use a filemanager like FExplorer or SeleQ to add the folders: "c:/system/Apps/phone/oplogo". Add a .bmp picture to folder "oplogo" and restart your phone! The .bmp picture size needs to be: 97 x 25 pixels

Tip 11: Check if the recepients phone is on
Delivery reports

or

Type *0# your message in the message composer window space then write your message, the recipient will not see the star zero hash bit - just the message When they read it it will relay a message back to your fone showing the time they recieved it. (haven't yet tried it myself though)

Tip 12: BlueJacking

First up, you need to know what Bluetooth is. There are lots of types of modern devices that incorporate Bluetooth as one of their many features. PDAs, mobile phones and laptops are a few of these modern devices. Bluetooth means that Bluetooth enabled devices can send things like phonebook/address book contacts, pictures & notes to other Bluetooth enabled devices wirelessly over a range of about 10 metres. So, we've got past the boring part. Now, using a phone with Bluetooth, you can create a phonebook contact and write a message, eg. 'Hello, you've been bluejacked', in the 'Name' field. Then you can search for other phones with Bluetooth and send that phonebook contact to them. On their phone, a message will popup saying "'Hello, you've been bluejacked' has just been received by Bluetooth" or something along those lines. For most 'victims' they will have no idea as to how the message appeared on their phone.


Tip 13: While you are viewing a picture in your phone's gallery, press one of these shortcut keys (definitely works on 6600, not sure about other symbians)
1 - turn image anticlockwise
3 - turn image clockwise
* - toggle on/off of full screen
5 - zoom in
0 - zoom out

Tips 14 :u can select all files in a folder by selecting THE folder and copy it then paste it somewhere. However u need to make a new directory. Fexplorer wun let u copy that folder together. Well seleQ can mark files to copy but it really takes time!

Tips 15 :A soft and Hard reset
A Soft-reset - the process of resetting all the settings of the phone to the factory default! No applications are deleted! A Hard-reset is like formatting a drive! It does format the memory. Everything that has been installed after the first use of the phone is deleted! It will recover the memory of the phone to the state you purchased it! It is done by inputing the following code: *#7370# NOTE: The battery must be full or the charger has to be connected to the phone so that it does not run out of power and make the phone unusable

Oct 11, 2008

Hacking: Removing installed Themes in s60v3

Many people have experienced a bug where they will install a theme on their device but when they try to remove it using the Application Manager there is no entry for it. I still see this problem on the latest N73ME firmware and on newer firmware for other devices as well. Don't despair though, as long as you install your themes to your memory card there is an easy way to remove those unwanted themes.

1. Connect your device to your PC in 'Mass storage' mode - or insert your Mini SD card into a card reader and connect it to your PC.

2. Once your PC recognizes your card a new drive will appear under 'My Computer'. Open it, and browse to private10207114import.

3. Browse through each of the folders in this directory to find the theme you would like to remove. The MBM, MIF, and SKN files in each folder should each be named after the theme - so if you want to remove a theme called "MyTheme", look for "MyTheme.mbm" etc.

*Note that you may see some MBM/MIF/SKN files named simply "themepackage.mbm" etc. In this case, simply open the SKN file in Notepad and you will see the actual theme name in the first few lines of text.


4. Once you've found the folder containing the theme files you'd like to remove, simply delete the contents of the folder (don't delete the folder itself).

Now put your card back in your phone you'll notice that the theme is no longer listed under themes and you've freed up some space on your memory card.

How to crack Windows Terminal Services 3 month trial

Thanks to a Microsoft article, I've found out that it is very easy to extend your Windows Terminal Services 3-month trial or experience time. It's so easy that I'm sure many administrators have done this in their own systems, while waiting for their managers or financial staff to buy the definitive licenses (not being hypocrite here).

Following these instructions, you don't have to crack any program. You won't mess with your system. The magic is to only delete the licenses databases both in the server and the clients, and let windows re-create them for you.

Make sure you've installed "Terminal Services Licensing". By the way, this method only makes sense if you need to use Terminal Services in Application Mode, which is the one that requires licensing.

The idea is quite simple.

First, disconnect all users from the terminal. If you need to do this remotely, you can also disconnect yourself, and access the files remotely.

Go to %WINDIR%\system32\lserver

Notice the file TSLIC.edb. Rename it to tslic.old

In every client computer, remove the CAL TS registry keys, located at:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSLicensing

Restart your server.

Oct 10, 2008

Yahoo Mail Setting for your Mobile

Steps to configure Yahoo mailbox on your mobile. Its very simple just 5 Minute to configure it. Learn with screen shot. This is tested on N73 and works perfectly.

For configuration

Go to tools--> Setting Wizard--> Email Setting-->


INCOMING E-MAIL


User name- (your user name)
Password- (your password)
Incoming mail server-pop.mail.yahoo.co.in (or what ever yours)
Access point-( your gprs access point)
Mail box name-yahoo
Mail box type- pop3
Security ports- off
Ports- default
APOP secure login-off


FOR OUTGOING E-MAIL


Email adress- (your email address)
User name- (your user name)
Password- (your password)
Out going mail server- smtp.mail.yahoo.co.in (or what ever yours)
Access point- (your access point)
Security ports-off
port-587
Thats all now go to automatic retrieval and change header retrieval to always for auto download

Oct 9, 2008

20 Best Websites To Download Free EBooks








We understand that reading is the most simplest way for human to derive and constructing meaning in order to gain a particular knowledge from a source. This tendency has been digitized when books evolve into digital media equivalent – E-Books.
It would be nice if we’re able to download free e-book and take it with us. That’s why we’ve again crawled deep into the Internet to compile this list of 20 places to download free e-books for your use. Full list after jump.


FreeBookSpot
FreeBookSpot is an online source of free ebooks download with 4485 FREE E-BOOKS in 96 categories which up to 71,97 GB.

You can search and download free books in categories like scientific, engineering, programming, fiction and many other books. No registration is required to download free e-books.

4eBooks
4eBooks has a huge collection of computer programming ebooks. Each downloadable ebook has a short review with a description. You can find over thousand of free ebooks in every computer programming field like .Net, Actionscript, Ajax, Apache and etc.

Free-eBooks
Free-eBooks is an online source for free ebook downloads, ebook resources and ebook authors. Besides free ebooks, you also download free magazines or submit your own ebook.

You need to become a Free-EBooks.Net member to access their library. Registration is free.

ManyBooks
ManyBooks provides free ebooks for your PDA, iPod or eBook Reader. You can randomly browse for a ebook through the most popular titles, recommendations or recent reviews for visitors. There are 21,282 eBooks available here and they’re all free!

GetFreeEBooks
GetFreeEBooks is a free ebooks site where you can download free books totally free. All the ebooks within the site are legal downloadable free ebooks.

FreeComputerBooks
FreeComputerBooks consists of a huge collection of free online Computer, Programming, Mathematics, Technical Books, Lecture Notes and Tutorials. It is very well categorized by topics, with 12 top level categories, and over 150 sub-categories.

FreeTechBooks
FreeTechBooks lists free online computer science, engineering and programming books, textbooks and lecture notes, all of which are legally and freely available over the Internet. Throughout FreeTechBooks, other terms are used to refer to a book, such as ebook, text, document, monogram or notes.

Scribd
Scribd, the online document sharing site which supports Word, Excel, PowerPoint, PDF and other popular formats. You can download a document or embed it in your blog or web page.

Globusz
Globusz is a unique ePublishing house, specializing in free eBook downloads. They also provide an excellent Star Rating Showcase for new and evolving authors.

KnowFree
KnowFree is a web portal where users are able to exchange freely e-books, video training and other materials for educational purposes and self-practice.

OnlineFreeEBooks
OnlineFreeEBooks provides links to various ebooks (mostly in pdf) spanning in 9 big categories which are: Automotive Ebooks, Business Ebooks, Engineering Ebooks, Gadget Ebooks, Hardware Ebooks, Health & Medical Ebooks, Hobbies Ebooks, Programming & Technology Ebooks, Sport & Martial Art Ebooks.

MemoWare
MemoWare has a unique collection of thousands of documents (databases, literature, maps, technical references, lists, etc.) specially formatted to be easily added to your PalmOS device, Pocket PC, Windows CE, EPOC, Symbian or other handheld device.

BluePortal
OnlineComputerBooks
OnlineComputerBooks contains details about free computer books, free ebooks, free online books and sample chapters related to Information Technology, Computer Science, Internet, Business, Marketing, Maths, Physics and Science which are provided by publishers or authors.

SnipFiles
SnipFiles offers you free ebooks and software legally by brought or attained PLR, resale or master rights to all the products on their page.

BookYards
BookYards is a web portal in which books, education materials, information, and content will be freely to anyone who has an internet connection.

The Online Books Page
The Online Books Page is a Listing over 30,000 free books on the Web.

AskSam Ebooks
AskSam Ebooks has a collection of free e-books like Shakespeare, and assorted legal & governmental texts.

Baen Free Library
Baen Free Library is an online library of downloadable science fiction novels.

eBookLobby
Free ebooks in eBookLobby are divided into different categories. Categorys range from business, art, computing and education. Select the category appropriate to the e-book you’re looking for.



More Free eBook resources
PlanetPDF - A small collection of classic novels all in PDF format.
DailyLit - Read books online by daily email and RSS feed.
Wikibooks - Wikibooks is a Wikimedia community for creating a free library of educational textbooks that anyone can edit.
Dwalin - Free novels in text format.
Project Gutenberg - Free ebooks from producers.
Adobe Free eBooks - In Adobe’s Free eBooks area, you can download, unlock, and read electronic books on your personal computer or reading device.
Alive & Free - A page of links to some recent books from living authors available free online.
Franklin - Thousands of free titles in text and HTML file formats.
Read Easily - An ebook online library which has been designed to provide you an adaptive reading experience!
PDFbooks - This new site offers around 4,700 downloadable public domain e-books.
Witguides - An online source for a wide range of useful e-books that are completely free with no need to sign-up or buy anything.
Diesel eBooks -Offer free ebooks formatted for both Microsoft Reader and Mobipocket.
Free eBook Miners -
Free eBooks for your education, research or amusement.
Planet eBook -
Free classic literature to download and share.
e-Library - Plenty of free ebooks available for download

Oct 8, 2008

20 Useful Web Applications For Firefox Sidebar





Do you have a monitor so big it makes your screen looks empty when you only have one website opened in browser? This probably happens to those that uses wide screen monitors. Firefox browser comes with a sidebar that allows you to run web applications on it. So while doing the surfing on the right side, you too can have something running on the left sidebar. It greatly increases productivity if the entire browser is fully utilized.
Here’s 20 Useful Web Applications you can place on Firefox Sidebars. Full list after jump.


FaceBook Chat
If you are using Firefox, you can place the Facebook Chat at the sidebar.

Online Video (YouTube, Metacafe, Dailymotion)
YouPlayer is a video player with playlist which works on Firefox sidebar while you are surfing the Internet on the right.

Google Reader
If you are a big fan of both Google Reader and Firefox, you’ll be interested to know that Google’s iPhone version of Reader is a perfect fit for the Firefox sidebar.

Gtalk
Put the Google Talk client in the Firefox sidebar so it always stays in the foreground no matter what website you are on currently.

Google Notebook
Take the Google personalized homepage widget for Google Notebook and add it to the sidebar of Firefox.

Meebo
Browse away in Firefox, but Meebo follows along in a sidebar.

Google Calendar
Now you can access your Google Calendar and upcoming events on your agenda without pulling up a new web page.

Twitter
Quickly and easily send and receive messages via twitter in your firefox browser.

iGoogle
View your Google Personalized Home page modules in the sidebar with an optimized layout.

FriendFeed
Put Friendfeed into your firefox sidebar in two simple steps.

iPhone Applications – Facebook, goMoves and iZoho
Even though you might not have an iPhone, there is still a chance that you can use them with Firefox’s sidebar.

Google Applications – Gmail and Google Docs
Step-by-step how to embed every Google Application in your left sidebar in a matter of seconds.

Google Maps
If you’re finding yourself switching between Google Maps and another browser window of non-mapped addresses, this Firefox add-on might be the answer!

Flickr
Browse and search flickr photos in a sidebar.

LookWayUp Dictionary
Look up a term in the dictionary in the sidebar by pressing Alt [.

Plurk
The Plurk Mobile Sidebar comes complete with Firefox 2 & 3 support, a headless thing button for your toolbar and a keyboard shortcut.

WordPress Dot Com
Get quick access to your wordpress.com account from your browser sidebar.

Gabbly Chat
Chat using the AJAX application, gabbly.com from the sidebar.

Del.icio.us
Access and maintain your del.icio.us account. Easily delete, edit and search your bookmarks from the sidebar.

Yoono
In a single browser sidebar, Yoono users can interact with the best of the Web more than ever before by discovering, communicating, and sharing with friends across multiple networks and platforms all in one place.

Oct 7, 2008

List of Trojan Ports

The following are the default Trojan port numbers and the Trojan Daemons running in it. Check whether any of the following ports are opened on your computer and avoid getting infected again.

TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250
TCP 28 Amanda.200
TCP 31 MastersParadise.920
TCP 68 Subseven.100
TCP 142 NetTaxi.180
TCP 146 Infector.141, Intruder.100, Intruder.100
TCP 171 ATrojan.200
TCP 285 WCTrojan.100
TCP 286 WCTrojan.100
TCP 334 Backage.310
TCP 370 NeuroticKat.120, NeuroticKat.130
TCP 413 Coma.109
TCP 420 Breach.450
TCP 555 Id2001.100, PhaseZero.100, StealthSpy.100
TCP 623 Rtb666.160
TCP 660 Zaratustra.100
TCP 661 Noknok.800, Noknok.820
TCP 666 BackConstruction.210, BackConstruction.250, Bla.100, Bla.200, Bla.400, Bla.503, Cain.150, Dimbus.100, Noknok.820, Ripper.100, SatansBackdoor.100, SatansBackdoor.101, SatansBackdoor.102, Unicorn.100, Unicorn.101, Unicorn.110
TCP 667 SniperNet.210, Snipernet.220
TCP 668 Unicorn.101, Unicorn.110
TCP 680 Rtb666.160
TCP 777 Tiny.100, Undetected.230, Undetected.300, Undetected.310, Undetected.320, Undetected.330, Undetected.331, Undetected.332
TCP 785 NetworkTerrorist.100
TCP 800 NeuroticKitten.010
TCP 831 NeuroticKat.100, NeuroticKat.120, NeuroticKat.130
TCP 901 NetDevil.130, NetDevil.140
TCP 1000 DerSpaeher.200
TCP 1001 Silencer.100
TCP 1008 AutoSpy.100
TCP 1010 DerSpaeher.200
TCP 1015 Doly.150
TCP 1111 TPort.100
TCP 1130 Noknok.800, Noknok.820
TCP 1207 SoftWAR.100
TCP 1243 Subseven.100, SubSeven.110, SubSeven.180, SubSeven.190, Subseven.200
TCP 1245 VoodooDoll.006
TCP 1269 Matrix.130
TCP 1480 RemoteHack.130
TCP 1568 RemoteHack.100, RemoteHack.110
TCP 1600 DirectConnection.100
TCP 1601 DirectConnection.100
TCP 1602 DirectConnection.100
TCP 1634 NetCrack.100
TCP 1784 Snid.120, Snid.212
TCP 1999 TransmissionScout.100, TransmissionScout.110
TCP 2000 ATrojan.200, InsaneNetwork.400
TCP 2001 DIRT.220, TrojanCow.100
TCP 2003 TransmissionScout.100, TransmissionScout.110
TCP 2023 RipperPro.100
TCP 2040 InfernoUploader.100
TCP 2115 Bugs.100
TCP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
TCP 2332 SilentSpy.202
TCP 2589 Dagger.140
TCP 2600 DigitalRootbeer.100
TCP 2989 Rat.200
TCP 3128 MastersParadise.970
TCP 3129 MastersParadise.920, MastersParadise.970
TCP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
TCP 3215 BlackStar.100, Ghost.230
TCP 3333 Daodan.123
TCP 3410 OptixPro.100, OptixPro.110
TCP 3456 Force.155, TerrorTrojan.100
TCP 3505 AutoSpy.130, AutoSpy.140
TCP 3586 Snid.120, Snid.212
TCP 3700 PortalOfDoom.100
TCP 3723 Mantis.100
TCP 3800 Eclypse.100
TCP 3996 RemoteAnything.364
TCP 4000 SkyDance.220, SkyDance.229
TCP 4201 Wartrojan.160, Wartrojan.200
TCP 4225 SilentSpy.202
TCP 4321 Bobo.100
TCP 4444 AlexTrojan.200, Crackdown.100
TCP 4488 EventHorizon.100
TCP 4523 Celine.100
TCP 4545 InternalRevise.100, RemoteRevise.150
TCP 4567 FileNail.100
TCP 4666 Mneah.100
TCP 4950 ICQTrojan.100
TCP 5005 Aladino.060
TCP 5025 Keylogger.WMRemote.100
TCP 5031 NetMetro.104
TCP 5032 NetMetro.104
TCP 5033 NetMetro.104
TCP 5050 RoxRat.100
TCP 5151 OptixLite.020, OptixLite.030, OptixLite.040
TCP 5190 MBomber.100
TCP 5277 WinShell.400
TCP 5343 WCRat.100
TCP 5400 BackConstruction.120, BackConstruction.150, BladeRunner.080, DeepThroat.300
TCP 5401 BackConstruction.120, BackConstruction.150, BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
TCP 5402 BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
TCP 5534 TheFlu.100
TCP 5550 XTCP.200, XTCP.201
TCP 5555 Noxcape.100, Noxcape.200
TCP 5695 Assassin.100
TCP 5714 WinCrash.100
TCP 5741 WinCrash.100
TCP 5742 WinCrash.103
TCP 5802 Y3KRat.160
TCP 5810 Y3KRat.160
TCP 5838 Y3KRat.170
TCP 5858 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5880 Y3KRat.140
TCP 5881 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5883 Y3KRat.110, Y3KRat.140
TCP 5884 Y3KRat.140, Y3KRat.150
TCP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5886 Y3KRat.120, Y3KRat.140
TCP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5889 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5890 Y3KRat.140
TCP 6400 Thething.100, Thething.150
TCP 6556 AutoSpy.120, AutoSpy.122
TCP 6655 Aqua.020
TCP 6660 LameSpy.095
TCP 6666 LameRemote.100, ProjectMayhem.100
TCP 6669 Vampire.100
TCP 6670 DeepThroat.200, DeepThroat.210
TCP 6671 DeepThroat.310
TCP 6699 HostControl.101
TCP 6711 DeepThroat.300, Noknok.820, SubSeven.180, SubSeven.190
TCP 6712 Subseven.100
TCP 6713 Subseven.100
TCP 6767 NTRC.120
TCP 6776 SubSeven.180, SubSeven.190, Subseven.200
TCP 6789 Doly.200
TCP 6796 SubSeven.214
TCP 6912 ShitHeep.100
TCP 6939 Indoctrination.100
TCP 6953 Lithium.100
TCP 6969 2000Cracks.100, Bigorna.100, Danton.110, Danton.210, Danton.220, Danton.310, Danton.320, Danton.330, GateCrasher.110, NetController.108, Sparta.110, VagrNocker.120
TCP 6970 Danton.330
TCP 7001 Freak88.100
TCP 7119 Massaker.100
TCP 7200 Massaker.110
TCP 7300 Coced.221
TCP 7301 Coced.221
TCP 7306 NetSpy.200, NetSpy.200
TCP 7410 Phoenix.190, Phoenix.200
TCP 7511 Genue.100
TCP 7609 Snid.120, Snid.212
TCP 7614 Wollf.130
TCP 7648 BlackStar.100, Ghost.230
TCP 7788 Last.2000, Matrix.200
TCP 7826 MiniOblivion.010, Oblivion.010
TCP 7887 SmallFun.110
TCP 7891 Revenger.100
TCP 7979 VagrNocker.200
TCP 7997 VagrNocker.200
TCP 8000 XConsole.100
TCP 8011 Way.240
TCP 8012 Ptakks.215, Ptakks.217
TCP 8110 LoseLove.100
TCP 8111 LoseLove.100
TCP 8301 LoseLove.100
TCP 8302 LoseLove.100
TCP 8372 NetBoy.100
TCP 8720 Connection.130
TCP 8734 AutoSpy.110
TCP 8811 Force.155
TCP 8899 Last.2000
TCP 9000 Aristotles.100
TCP 9301 LoseLove.100
TCP 9400 InCommand.100, InCommand.110, InCommand.120, InCommand.130, InCommand.140, InCommand.150, InCommand.153, InCommand.160, InCommand.167, InCommand.170
TCP 9401 InCommand.100, InCommand.110, InCommand.170
TCP 9402 InCommand.100, InCommand.110
TCP 9561 CRatPro.110
TCP 9563 CRatPro.110
TCP 9580 TheefLE.100
TCP 9696 Danton.210, Ghost.230
TCP 9697 Danton.320, Danton.330, Ghost.230
TCP 9870 R3C.100
TCP 9872 PortalOfDoom.100
TCP 9873 PortalOfDoom.100
TCP 9874 PortalOfDoom.100
TCP 9875 PortalOfDoom.100
TCP 9876 Rux.100, SheepGoat.100
TCP 9877 SmallBigBrother.020
TCP 9878 SmallBigBrother.020, TransmissionScout.100, TransmissionScout.110, TransmissionScout.120
TCP 9879 SmallBigBrother.020
TCP 9999 ForcedEntry.100, Infra.100, Prayer.120, Prayer.130, TakeOver.200, TakeOver.300
TCP 10001 DTr.130, DTr.140
TCP 10013 Amanda.200
TCP 10067 PortalOfDoom.100
TCP 10100 Gift.240
TCP 10101 NewSilencer.100
TCP 10167 PortalOfDoom.100
TCP 10528 HostControl.100, HostControl.260
TCP 10607 Coma.109
TCP 10666 Ambush.100
TCP 11011 Amanda.200
TCP 11050 HostControl.101
TCP 11051 HostControl.100, HostControl.260
TCP 11223 AntiNuke.100, Progenic.100, Progenic.110
TCP 11225 Cyn.100, Cyn.103, Cyn.120
TCP 11306 Noknok.800, Noknok.820
TCP 11831 Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
TCP 11991 PitfallSurprise.100
TCP 12043 Frenzy.2000
TCP 12345 Fade.100, Netbus.160, Netbus.170, VagrNocker.400
TCP 12346 Netbus.160, Netbus.170
TCP 12348 Bionet.210, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.316, Bionet.317
TCP 12349 Bionet.084, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.314, Bionet.316, Bionet.317, Bionet.401, Bionet.402
TCP 12389 KheSanh.210
TCP 12478 Bionet.210
TCP 12623 Buttman.090, Buttman.100
TCP 12624 Buttman.090, Buttman.100
TCP 12625 Buttman.100
TCP 12904 Akropolis.100, Rocks.100
TCP 13473 Chupacabra.100
TCP 13753 AFTP.010
TCP 14100 Eurosol.100
TCP 14194 CyberSpy.840
TCP 14286 HellDriver.100
TCP 14500 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14501 PCInvader.060, PCInvader.070
TCP 14502 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14503 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14504 PCInvader.050, PCInvader.060
TCP 15092 HostControl.100, HostControl.260
TCP 15382 SubZero.100
TCP 15432 Cyn.210
TCP 15555 ICMIBC.100
TCP 16322 LastDoor.100
TCP 16484 MoSucker.110
TCP 16661 Dfch.010
TCP 16969 Progenic.100
TCP 16982 AcidShiver.100
TCP 17300 Kuang.200
TCP 17499 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
TCP 17500 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
TCP 17569 Infector.141, Infector.160, Infector.170, Infector.180, Infector.190, Infector.200, Intruder.100, Intruder.100
TCP 17593 AudioDoor.120
TCP 19191 BlueFire.035, BlueFire.041
TCP 19604 Metal.270
TCP 19605 Metal.270
TCP 19991 Dfch.010
TCP 20000 Millenium.100
TCP 20001 Millenium.100, PshychoFiles.180
TCP 20002 AcidKor.100, PshychoFiles.180
TCP 20005 MoSucker.200, MoSucker.210, MoSucker.220
TCP 21212 Schwindler.182
TCP 21554 Exploiter.100, Exploiter.110, Girlfriend.130, GirlFriend.135
TCP 21579 Breach.2001
TCP 21584 Breach.2001
TCP 21684 Intruse.134
TCP 22068 AcidShiver.110
TCP 22115 Cyn.120
TCP 22222 Prosiak.047, Ruler.141, Rux.300, Rux.400, Rux.500, Rux.600
TCP 22223 Rux.400, Rux.500, Rux.600
TCP 22456 Bla.200, Bla.503
TCP 22457 AcidShiver.120, Bla.200, Bla.503
TCP 22784 Intruzzo.110
TCP 22845 Breach.450
TCP 22847 Breach.450
TCP 23005 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
TCP 23006 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
TCP 23032 Amanda.200
TCP 23432 Asylum.010, Asylum.012, Asylum.013, Asylum.014, MiniAsylum.110
TCP 23456 EvilFTP.100, VagrNocker.400
TCP 23476 DonaldDick.153, DonaldDick.154, DonaldDick.155
TCP 23477 DonaldDick.153
TCP 24000 Infector.170
TCP 24307 Wildek.020
TCP 25386 MoonPie.220
TCP 25486 MoonPie.220
TCP 25555 FreddyK.100, FreddyK.200
TCP 25556 FreddyK.100
TCP 25685 MoonPie.010, MoonPie.012, MoonPie.130, MoonPie.220, MoonPie.240, MoonPie.400
TCP 25686 MoonPie.135, MoonPie.200, MoonPie.400
TCP 25982 MoonPie.135, MoonPie.200
TCP 26274 Delta.050
TCP 27160 MoonPie.135, MoonPie.200
TCP 27184 Alvgus.100, Alvgus.800
TCP 27374 Muerte.110, Subseven.210, SubSeven.213
TCP 28429 Hack’a'Tack.2000
TCP 28430 Hack’a'Tack.2000
TCP 28431 Hack’a'Tack.2000
TCP 28432 Hack’a'Tack.2000
TCP 28433 Hack’a'Tack.2000
TCP 28434 Hack’a'Tack.2000
TCP 28435 Hack’a'Tack.2000
TCP 28436 Hack’a'Tack.2000
TCP 29559 DuckToy.100, DuckToy.101, Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
TCP 29891 Unexplained.100
TCP 30000 Infector.170
TCP 30001 Error32.100
TCP 30003 LamersDeath.100
TCP 30029 AOLTrojan.110
TCP 30100 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30101 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30102 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30103 NetSphere.131
TCP 30947 Intruse.134
TCP 31320 LittleWitch.400, LittleWitch.420
TCP 31337 BackOrifice.120, Khaled.100, OPC.200
TCP 31415 Lithium.101
TCP 31416 Lithium.100, Lithium.101
TCP 31557 Xanadu.110
TCP 31631 CleptoManicos.100
TCP 31745 Buschtrommel.100, Buschtrommel.122
TCP 31785 Hack’a'Tack.100, Hack’a'Tack.112
TCP 31787 Hack’a'Tack.100, Hack’a'Tack.112
TCP 31789 Hack’a'Tack.100, Hack’a'Tack.112
TCP 31791 Hack’a'Tack.100, Hack’a'Tack.112
TCP 31887 BDDT.100
TCP 31889 BDDT.100
TCP 32100 ProjectNext.053
TCP 32418 AcidBattery.100
TCP 32791 Akropolis.100, Rocks.100
TCP 33291 RemoteHak.001
TCP 33333 Blackharaz.100, Prosiak.047, SubSeven.214
TCP 33577 SonOfPsychward.020
TCP 34324 TelnetServer.100
TCP 34763 Infector.180, Infector.190, Infector.200
TCP 35000 Infector.190, Infector.200
TCP 35600 Subsari.140
TCP 36794 BugBear.100
TCP 37237 Mantis.020
TCP 37651 YAT.210
TCP 37653 YAT.310
TCP 40308 Subsari.140
TCP 40412 TheSpy.100
TCP 40421 MastersParadise.970
TCP 40422 MastersParadise.970
TCP 40999 DiemsMutter.110, DiemsMutter.140
TCP 41626 Shah.100
TCP 44444 Prosiak.070
TCP 45673 Akropolis.100, Rocks.100
TCP 47262 Delta.050
TCP 48006 Fragglerock.200
TCP 49683 HolzPferd.210
TCP 50000 Infector.180
TCP 50130 Enterprise.100
TCP 50766 Fore.100
TCP 51234 Cyn.210
TCP 51966 Cafeini.080, Cafeini.110
TCP 54321 PCInvader.010
TCP 57341 NetRaider.100
TCP 57922 Bionet.084
TCP 58008 Tron.100
TCP 58009 Tron.100
TCP 59090 AcidReign.200
TCP 59211 DuckToy.100, DuckToy.101
TCP 59345 NewFuture.100
TCP 60000 DeepThroat.300, MiniBacklash.100, MiniBacklash.101, MiniBacklash.101
TCP 60411 Connection.100, Connection.130
TCP 60412 Connection.130
TCP 60552 RoxRat.100
TCP 63536 InsaneNetwork.500
TCP 63878 AphexFTP.100
TCP 63879 AphexFTP.100
TCP 64969 Lithium.100
TCP 65000 Socket.100
UDP 1 SocketsDeTroie.250
UDP 666 Bla.200, Bla.400, Bla.503, Noknok.820
UDP 1130 Noknok.800, Noknok.820
UDP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
UDP 2989 Rat.200
UDP 3128 MastersParadise.970
UDP 3129 MastersParadise.920, MastersParadise.970
UDP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
UDP 3333 Daodan.123
UDP 3800 Eclypse.100
UDP 3996 RemoteAnything.364
UDP 4000 RemoteAnything.364
UDP 5555 Daodan.123
UDP 5881 Y3KRat.110, Y3KRat.140
UDP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
UDP 5883 Y3KRat.110, Y3KRat.140
UDP 5884 Y3KRat.140, Y3KRat.150
UDP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
UDP 5886 Y3KRat.120, Y3KRat.140
UDP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
UDP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.150
UDP 6953 Lithium.100
UDP 8012 Ptakks.217
UDP 10067 PortalOfDoom.100
UDP 10167 PortalOfDoom.100
UDP 10666 Ambush.100
UDP 11225 Cyn.100, Cyn.103, Cyn.120
UDP 11306 Noknok.800, Noknok.820
UDP 12389 KheSanh.210
UDP 12623 Buttman.090, Buttman.100
UDP 12625 Buttman.100
UDP 14100 Eurosol.100
UDP 23476 DonaldDick.155
UDP 26274 Delta.050
UDP 27184 Alvgus.100
UDP 28431 Hack’a'Tack.2000
UDP 28432 Hack’a'Tack.2000
UDP 28433 Hack’a'Tack.2000
UDP 28434 Hack’a'Tack.2000
UDP 28435 Hack’a'Tack.2000
UDP 28436 Hack’a'Tack.2000
UDP 29891 Unexplained.100
UDP 30103 NetSphere.131
UDP 31320 LittleWitch.400, LittleWitch.420
UDP 31337 BackOrifice.120, OPC.200
UDP 31416 Lithium.100, Lithium.101
UDP 31789 Hack’a'Tack.100, Hack’a'Tack.112
UDP 31791 Hack’a'Tack.100, Hack’a'Tack.112
UDP 33333 Blackharaz.100
UDP 47262 Delta.050
UDP 49683 HolzPferd.210
UDP 60000 MiniBacklash.100

.

Oct 6, 2008

Clear Unwanted Items From Add or Remove Programs

Here is a Trick that you can use to clear unwanted stuffs from Add / Remove Programs,
there are few stuffs that you can’t just remove it from appwiz.cpl.

1. Click on the start menu and click on Run.
2. Once the run dialog box opens up, type in regedit.
3. Goto the following locatiom

HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Uninstall

4. Under this Key, you can find a lot of CLSID and the name of the tool or software, identify them and delete them.
5. Sometimes a system restart is necessary to make the changes come alive and you are done now.

.

Oct 5, 2008

50 Simple Ways to Gain RSS Subscribers







Those days are quite rare though, and most people seem to have a hard time gaining even a small number of new RSS subscribers consistently.
Is there anything you can do about it? Any way to efficiently attract more RSS subscribers?

Sure there is. Many people wrote about this topic in the past, but I wanted to give my take on the issue too. I wrote those 50 ideas as they were coming to my head, as briefly as possible. Enjoy.

1. Have a big RSS icon. People are lazy. You need to keep that fact always in mind. If you use a little RSS icon, visitors might have a problem finding it. Most of those will just give up after a couple of seconds, so make sure the RSS icon is big and easily recognizable.

2. Display the RSS icon above the fold. Apart from using a big RSS icon, you must make sure that you display it above the fold. That is where most blogs have one, and that is where people are used to look for when they want to subscribe, so go with the flow.

3. Display the RSS icon on every page of your blog. When I started blogging I did this mistake. Only my homepage used to have an RSS icon…. As soon as I added it to every single page on the blog, the number of subscribers jumped.

4. Use words. Depending on your audience, just using an RSS icon might not be effective. If they aren’t tech-savvy, they might not know what that little orange thing is. In those cases, you can write a small message explaining that subscribing will allow them to keep updated with your posts and so on.

5. Write a post asking for people to subscribe. Ever heard the saying “Ask and thou shalt receive”? This principle works on most areas of our lives. Blogging is no exception. If you want people to subscribe to your feed, ask them to! Write a post about it, give them some reasons and you will see how they respond.

6. Use the FeedSmith plugin. Unless you hand code a lot of redirects on your blog, readers will still be able to subscribe to different RSS feeds provided by WordPress. This plugin will make sure that all your subscribers will be forwarded to the Feedburner feed, so that you can track them and control how your feed is formatted.

7. Offer email subscriptions. Like it or not, only a small percentage of the Internet users know about or use RSS feeds. Studies confirm that this number is below 10% around the world. Why would you want to miss the other 90% of the pie? If you use Feedburner, you just need to go on the “Publicize” tab to activate your email subscriptions.

8. Use an email subscription form. For most bloggers, an email subscription form will convert better than a simple “Subscribe via email” link. That is because Internet users are used to seeing those forms around, and typing their email address there is quite intuitive. The top of your sidebar is a good spot to place one.

9. Encourage readers to subscribe at the bottom of every post. Apart from having an RSS icon and email subscription form above the fold, it is also important to place them below each single post. Why? Because right after people finish reading your articles, they will look for something to do next, and subscribing to your blog is a good option. Additionally, if the article they just read was really good, they will be on the right mindset to subscribe and receive more of your articles in the future.

10. As few steps as possible. People are lazy (I know I mentioned it before, but it is worth re-emphasizing). The fewer the steps required for them to subscribe to your blog, the better. If you can reduce the number of clicks required, therefore, do it!

11. Use icons to offer subscription on the most popular RSS readers. One practical thing that you can do to reduce the number of steps required to subscribe to your feed is to use RSS reader specific icons (e.g., “Add to Google Reader” or “Subscribe on Bloglines”). Just analyze the most common RSS readers among your subscribers and add those icons to the sidebar.

12. Have clear focus on your blog. If you write about 10 different topics, it will be hard to convince people to subscribe to your blog. They might like your articles about technology, but they would hate to receive the house cleaning ones…. Having a clear focus is one of the most efficient ways to attract subscribers.

13. Publish new posts frequently and consistently. By frequently I mean publishing many posts per week or even per day, and by consistently I mean sticking with that frequency religiously. Those two factors will communicate to the visitors that your blog is active, and that subscribing to the RSS feed might be the best way to stay updated with it indeed.

14. Don’t exaggerate. While writing many posts per week or per day is usually a good thing, there is a limit to it. Many people mention that if a certain blog starts overwhelming them with dozens of new posts a day, they will just unsubscribe. The exceptions to this rule are the blogs on fast paced niches like gadget news.

15. Write valuable content. People will only subscribe to your RSS feed if there is some value that they can derive from it. This value might come from different different factors depending on your audience: it may come from the breaking news that you offer, from the deep analysis that you write, or from the funny things you say and so on, but it must be there.

16. Write unique content. You content might be valuable, but if people can find it elsewhere, they will have no reason to subscribe to your RSS feed. For example, suppose you copy all posts from a popular blog on your niche, say Lifehacker. You content would still be valuable, but it would not be unique, and most people would end up subscribing to the original source.

17. Don’t ramble or go off topic. If your blog has a clear focus as we suggested before, readers will subscribe to it for a very specific reason. If you then start writing about off topic stuff, it will annoy a great part of them. Just consider that a bad or unrelated post is worse than no post at all, since it might make some of your readers actually unsubscribe.

18. Use your RSS feed link when commenting on other blogs. Many bloggers have the habit of commenting on other people’s blogs. Some do it simply to join the conversation. Others because they want to promote their own blogs and generate some traffic. Either way, you can leave your RSS feed link instead of the website one to encourage people to subscribe to your feed (if you use Feedburner, they will be able to see your content anyway).

19. Run a contest. Contests are very popular on the blogosphere. If you have a somewhat popular blog, in fact, it is not difficult to raise some prizes and create one. By making subscribing to your RSS feed a requirement to participate, you could quickly boost the number of subscribers that you have. If you want to control who is going to take this action, use the email subscription method.

20. Offer random prizes to your subscribers. If you are not a fan of contests and competitions, you could always entice people to subscribe to your RSS feed by giving away random prizes. For example, if some company approaches you to donate some free copies of its product, you could in turn donate it to your subscribers

21. Write guest posts. Guest posts represent a very efficient technique for generating both brand awareness and traffic. If you guest blog on a popular blog on your same niche, there is also a good chance that a good percentage of that incoming traffic will end up subscribing to your feed.

22. Welcome the new readers. Whenever you manage to land a guest post on a really popular blog, or when you get mentioned on a larger website or mainstream site, it could be a good idea to write a specific post to welcome those readers. Use that post to describe your blog briefly, to talk a bit about yourself, and to encourage them to subscribe.

23. Go popular on social bookmarking sites. Some people say that the quality of the traffic coming from social bookmarking sites (e.g., Digg and StumbleUpon) is very low. This is true to some extent, because those visitors will rarely click on anything on your page (including on the subscribe link). Because of the sheer amount of traffic that you can get on those sites, however, even a really small conversion rate could easily mean 200 or 300 new subscribers in a matter of 24 hours.

24. Explain to your readers what is RSS. As we mentioned before, it is estimated that less than 10% of the popular know about or use RSS feeds. Can you do anything about this? Sure you can! Write a post teaching your readers what RSS is, why it is good, and how they can start using it. It works particularly well on blogs that have a non tech-savvy audience.

25. Have a special “Subscribe” page with all the info and links there. Apart from writing a specific post teaching your readers about RSS, you can also create a special “Subscribe” page on your blog where you explain briefly how to use RSS feeds, and place all the subscription links, badges, and email forms. You could then link to that page from the sidebar, with a link that would say “Subscription Options” or “How to subscribe.”

26. Create a landing page on your blog to convert visitors in subscribers. If you are going to purchase some banners or other type of advertising, it is highly recommended that you create a landing page to receive those visitors on the best way possible. Use that page to describe your blog, to highlight your best content, and to ask them to subscribe. When doing guest blogging, you could use this page as the byline link as well.

27. Send traffic to that page using PPC. Pay-per-Click advertising, like Google AdWords, is one of the cheapest ways to send targeted traffic to your site. Depending on the quality score that you get (this is calculated from the AdWords side) you could start getting visitors for as low as $0.01 each. That is, with $100, you could send up to 10,000 visitors to your landing page. With a 1% conversion rate this would mean 100 new subscribers.

28. Write an ebook and ask people to subscribe in order to download it. Whether you like them or not, eBooks are a part of the Internet. Many people write them, many others download and read them. If the content and the promotion are well structured, you have thousands of people wanting to read yours. What if you then require people to subscribe first before they can download it? That would bring a heck lot of new subscribers.

29. Launch an email newsletter with Aweber. An email newsletter can be used to complement the content on most blogs. You send a weekly email to those subscribers with your insider views of your niche, with some extra tips, tools and so on. If you then choose Aweber for your newsletter, you can use the “Blog Broadcast” feature to turn those newsletter subscribers into RSS readers too (they will receive a weekly summary from your feed).

30. Offer a full feed. If your goal is to have as many subscribers as possible, then offering a full RSS feed is the only way to go. Many people get annoyed by partial feeds, and even if that does not discourage them from subscribing at first, it might make them unsubscribe shortly after.

31. Clutter your website with ads. This point is a funny/weird addition to the list, and I don’t recommend anyone doing it. I didn’t invent this though, and I saw some people in the past talking about it. The idea is simple: if you clutter your website with many flashy and intrusive ads, but offer top quality content anyway, some people might get an urge to subscribe to your RSS feed just to avoid the clutter on the website….

32. Don’t clutter your RSS feed with ads. Just as too many ads on your site can scare visitors away, too many ads or badges or links on your RSS feed can make people unsubscribe. Keep the RSS feed as clean as possible. That is what people expect to have when they subscribe to an XML file, after all.

33. Use social proof. Ever entered into a restaurant because the place was packed with people, or didn’t enter one because it was empty? That is social proof in action. If you have a good number of RSS subscribers already (I would say over 500), you could display it on your site using the Feedburner feed count widget. This might motivate people to give your RSS feed a shot.

34. Offer breaking news. RSS feeds are one of the most efficient ways to keep up with sites that are frequently updated with information that you care about. If you manage to break some news, or to offer frequent updates on popular topics (like stock market alerts), people would have a stronger motivation to subscribe.

35. Mention that subscribing to your blog is free. It might sound strange, but many people actually get confused with the “Subscribe” terminology. I received dozens of emails over the past year from people that wanted to know if there was any cost associated with subscribing to my RSS feeds! To avoid any confusion, it could be worth mentioning that subscribing to your blog is free, so instead of “Subscribe to my RSS feed” you could use “Receive our updates for free.”

36. Use pop-ups to encourage subscription to your newsletter. Darren managed to increase his conversion rate by more than 700% using pop-ups. Sure, they are intrusive, but they work like nothing else. If you already have an established and loyal following, perhaps using this technique wouldn’t hurt your traffic. We also did a recent poll on the topic.

37. Use an animated RSS feed icon to draw attention. Animated ads get a much higher click-through rate, exactly because they move around and draw people’s attention. You can use the same technique with your RSS feed icon, and make it an animated GIF to call the attention of the visitors.

38. Use feed directories. Don’t expect to receive hundreds of new subscribers by using this technique, but every small bit helps right? Some people use feed directories to find new RSS feeds and content to subscribe to, so if you have some free time you could submit yours on those sites. Here is a list with almost 20 feed directories.

39. Email first time commentators encouraging them to subscribe. Sending a personal email to your first time commentators is a kind gesture, and many will thank you for that. You could use this opportunity to remind them that they can stay updated with your blog via the RSS feed. There is also plugin called Comment Relish that can automate this process, although it becomes less personal.

40. Make sure the feed auto-discovery feature is working. Most modern browsers have an auto-discovery feature that tried to identify if the website you are visiting has a valid RSS feed. If they do, the browser will present a small RSS icon on the right side of the address bar. So make sure that your can see that icon while visiting your blog, and click on it to see if the right RSS feed will pop. On WordPress you can edit this part on the header.php file.

41. Offer a comments feed. If you have an active community of readers who often engage in discussions on the comments section of your blog, you could consider offering a comments RSS feed.

42. Offer category feeds. If you have many categories on your blog, you could offer an RSS feed for each of them individually. This would enable visitors that are interested only in specific topics to subscribe to them and not to the whole blog. At the same time this granularity could increase the overall number of RSS subscribers you have.

43. Run periodic checks on your feeds. It is not rare to find blogs around the web with a broken RSS feed. Click on your own feed once in a while to make sure that the link is working, that the feed is working, and that it is a valid XML document.

44. Recover unverified email subscribers. You will notice that good percentage of your email subscribers will never confirm their subscription. Some are lazy, some just don’t understand the process. This percentage can go as high as 30%, so you could end up losing many would-be subscribers there. Fortunately you can email those unverified subscribers and remind them about the problem. It works for some.

45. Leverage an existing blog or audience. If you already have a popular blog, newsletter, forum, twitter account and so on, you could leverage that presence to get new subscribers. People that already follow you in some place will have a higher chance of subscribing to you new blog, especially if they like your work or person.

46. Use cross feed promotion. Find some related blogs that have a similar RSS subscriber base, and propose to the blogger to use a cross feed promotion deal. That is, you promote his blog on your feed footer, and he promotes your blog on his feed footer.

47. Use testimonials on your “Subscribe” page. You probably have seen how most product sales pages on the web use testimonials, right? That is because a personal recommendation from a third party goes a long way into convincing a prospect. If that is the case, why not use testimonials to convince people to subscribe to your RSS feed?

48. Get friends to recommend your site and RSS feed on their blog. Even stronger than having a testimonial on your “Subscribe” page is to have someone recommend you on his own blog or website. Many of his readers will pay attention to the message and head over to your blog to check what the fuzz is about.

49. Do something funny or weird while asking for people to subscribe. People love blogs with a sense of humor. If you can make them laugh, you have took them half way into subscribing. Some months ago I published the Huge RSS Icon Experiment, and gained 300 new subscribers in 3 days.

50. Start a long series so people subscribe to keep update with it. Long and structured series of posts are not only traffic magnets, but also RSS readers magnets. If a casual visitor discovers that you are publishing a long series about a topic he is interested on, he will think about subscribing in order to not miss the future posts of the series.

.

Subscribe via email N get Tips

Enter your email address:

Delivered by FeedBurner

Label Cloud

2009 (1) 2010 (3) 2011 (1) 2011 IPL Player (1) 3 IDIOTS (1) 3G dongle (1) Academics (3) ACCOUNT (1) ACRTICALS (3) acta (1) Addons (1) ADSL Router (1) Adzero (1) AIRTEL (14) Airtel 3G (1) airtel Grps (1) airtel proxy (1) android (3) Android Phone (3) Android Phone codes (1) ANTIVIRUS (7) ARP hacking (1) BAT (2) BHUVAN (1) BIOS (2) bitcomet (16) BITTORRENT (21) BLOG (4) BLOGGER (5) blu ray (1) BOLLYWOOD LATEST MOVIES (4) BOLLYWOOD MOVIES (4) BOOK (2) British rapper (1) BROADBAND (4) BSNL (7) BTJunkie (1) BTJunkie Shut down (1) BTJUNKIES (17) Cabana (1) calender (2) Caller ID (1) CAM RIPS (8) CAPCHA (1) CAT (1) CCNA (6) CCNP (1) CES 2011 (1) CHAT (2) CHATING (1) CHATTING (1) CHINA (3) Christmas (1) CID (1) CISCO (8) CISCO PRESS (2) CLONING (1) CODE (5) COLLECTION (2) COMMAND (2) CRACK (26) crack key (3) CRACKSOFTWARE (11) CSS (1) DAILY MOTION (1) Dan Bull (1) DAP (1) data backup (1) data storage (1) dekstop (1) Delhi 100 Year (1) DESI TORRENTS (20) DISK (1) DIY (1) DOCOMO (2) Docs (1) DOWNLOAD (13) DragonBall Browser (1) dvd (1) DVD Rip (12) dvd vs blu ray (1) E-mail (1) Ebook (7) EDUCATION (3) ERROR (3) ESET (1) ET (4) EXAM (8) EXPLORER (2) EXRTA TORRENT (20) extratorrent (10) FACEBOOK (8) facebook hacking (6) FACEBOOK TIMELINE (2) FACEBOOK Tips (1) FAT32 (1) FILESHARNING (1) FIRE FOX (14) First Bamboo Smartphone (1) FIRST ON NET (1) FOLDER (2) FORMAT (1) Free DNS (1) FREE GPRS (22) FREE MMS (12) FREE SMS (16) freesoftware (6) FRIST ON NET (1) FTP (1) full software (25) FUNNY (3) G.D (1) G.D. (1) GAME HACKING (12) GAME KEYS (2) GMAIL (12) GMAIL HACKING (16) GMAT (1) GNS3 (1) GOOGLE (53) GOOGLE CROME (20) Google Doodles (3) GOOGLE EARTH (23) Google Global DNS (2) Google Map. (1) Google Nexus (2) Google Nexus mobile (2) Google Open DNS (2) google pulgins (16) google Search Tips (7) google software (5) Google Tip (6) Google Tricks (6) GOOLGE HACK (35) GSM (2) gsm hack (1) GTALK (7) GURU OF HACKING (8) H (3) HA (1) HAC (3) HACK (100) HACKER (39) Hackers (14) HACKING (76) HACKINGTOOLS (38) Happy holidays (1) Happy holidays 2011 (1) HARDWARE (2) HOLLYWOOD MOVIES (4) hotmai (1) How To (1) how to backup data (1) how to store data (1) HSTR (2) HTML (1) HUTCH (2) I-PHONE (4) I-phone 4 (3) I-Phone 5 (3) I-Phone 5 Leak (2) I-phone Leak Video (2) IDEA (6) IDM software (1) IE (8) IE8 (6) IE9 (6) India Delhi (1) INFORMATION (3) INTERNET (22) IP-ADDRESS (6) iPhone 3 (1) iPhone 4s (1) iPhone 4s Tariff plan for india (1) iPhone 5 (1) iPhone4 (1) IPL 2011 (1) IPL 4 Auction News (1) IPL4 (1) IPLT20 Schedule (1) ISOHUNT (2) ISP (2) IT (2) jingle bells (1) JOKES (2) JTO 2009 (1) KEY (4) KeyBoard (1) Keyboard Tips (1) Kieron-Scott (1) KUTCH (1) learning software . Photoshop (2) lightroom (1) long term data backup (1) long term storage (1) Lumia 710 (1) Lumia 800 (1) MAC (2) MAC OS (1) Malware (1) Mango (1) MANGO Mobile OS (1) MANGO OS (2) MAT (1) MBA (3) Meego (1) MESSENGER (3) METACAFE (1) MICROSOFT (7) Microsoft Onenote (1) Microsoft PowerPoint (3) MOBILE (41) MOBILE CODES (27) Mobile Memory Card (1) Mobile Repair. (2) Mobile Save (1) mobile software (1) MODEM (2) MOTOROLA (2) MOUSE (1) MOVIES (5) MS-DOS (4) MS-OFFICE (3) MS-OFFICE KEYS (2) MSN HACKING (7) MSN PASSWORD (11) MTV (2) MYSPACE (1) N-SERIES (1) Network (5) NETWORKING (6) new camera (1) New Year (5) NEWS (3) NOD32 (1) NOKIA (10) Nokia lumia (1) Nokia Lumia 800 (1) Nokia Lumia 820 (1) Nokia Lumia 900 (1) Nokia Lumia 920 (1) Nokia Mango (2) Nokia meego (2) Nokia N9 (1) NORTON 360 (1) NOTEPAD (1) NOTIFICATION (1) NTFS (1) OPERA (5) ORKUT (16) ORKUT HACKING (18) ORKUT VIRUS (8) OUTLOOK (4) P2P (10) PAPER (1) PASSWORD (7) PC SUITE (3) Peer To Peer (8) PENDRIVE (1) PHILIPS (1) PHOTO (2) photoshop (1) pipa (1) Piracy (13) PIRATESBAY (26) PRINTER (1) PROXY SITES (3) Ragaa.com (1) RAPID HACK (6) rapidshare (1) Rapper protests piracy (1) REGISTRY (4) Reset Your Mobile Memory (1) RESULTS (4) ROADIES (4) Roadies 8.0 Raghu Rajiv RAnvijay Bani Roadies 5.0 Roadies 6.0 Roadies 7.0 (2) ROUTER (4) RSS (1) S60 (5) SAGEM (2) SAMSUNG (7) SARDAR (1) SCPIRTING (5) SCRAP (2) Search by Image (1) secret codes (2) Secure Your Computer (1) SECURITY (6) Serial key (2) SETTING (2) Shirt (1) SIM (1) SIMULATOR (3) SITEMETER HACK (1) SKYPE (1) Smartphone (1) SMS (7) SOFTWARE (17) Songs (1) Songs.pk (1) SOPA (2) SOPA Cabana (1) SPAM MAIL (3) statcounter (1) STD (1) storage (1) suraj fake (1) SYSTEM (1) T (1) TAG (1) Tango OS (1) TECH NEWS (1) THEMES (3) Timeline (1) TIMEPASS (4) TIP (110) TIPS (126) TNA (1) TOOLBAR (1) TOOLS (7) torrent (23) TORRENT HACK (9) TRICK (187) TROJAN (4) TUTORIAL (1) TV (1) TWEAK (8) UK (1) Unlimited Download (1) unlocking (1) UNRATED EDITIONS (3) USB (9) USB dongle (1) UTORRENT (15) VIDEO (4) Virus (2) Virus google (1) Virus total (1) Virustotal (1) VODAFONE (5) w3 counter (1) WAY2SMS (2) website (1) WI-FI (14) WINDOWS (96) WINDOWS 7 (44) windows 7 GodMode (2) Windows 7.5 OS (5) Windows 8 (9) windows 8 installation (2) WINDOWS VISTA (27) WINDOWS XP (92) windowsphone (1) Winzip (1) WIRELESS (12) WORDPRESS (1) WP7 (3) WP8 (3) WVIL (1) WVIL unbelievable (1) WWE PAYPER VIEW (1) WWE RAW (1) WWE SMACKDOWN (1) www.extrattorrent.com (5) XAT (1) XP Password (2) Xvid (9) YAHOO (18) YAHOO HACKING (11) yahoo messanger (4) YOUTUBE (9) YOUTUBE dOWNLOAD (3) YOUTUBE DOWNLOADER (3) youtube new look (2) zip7 (1)