DATE : 2 MARCH 2011
Save mobile battery upto 20%

How to save mobile battery upto 20%
- Turn off graphical wallpaper or flash wallpaper
- Turn off screensaver
- Enable power ,sleep mode

8 Tips to Make Your PC Very Fast

Have you ever wondered how much faster you could make your PC? Here are eight techniques that computer speed freaks use to squeeze every ounce of performance out of their systems.

1. Overclock your PC and graphics card: When you overclock your CPU, you set it to run it faster than its certified speed. This is usually okay because the CPU is designed to go beyond its stated velocity (chip makers build in a little cushion). With many PCs, you just increase the front-side bus speed and/or the CPU multiplier settings in your PC Setup program (which you enter by hitting or
after you turn your system on but before Windows loads).

For more details on how to overclock your CPU and graphics card, see last March's "Secret Tweaks" feature. Keep in mind, however, that overheating a processor--or any other chip, for that matter--can destroy it. Always do your homework before you alter your system.

2. Push your RAM timing: Lower the CAS Latency setting, typically from 3 or 2.5 to 2. This makes your memory faster, but it can also cause lockups on systems that use lower-quality memory chips. "CAS" stands for "column address strobe." Visit Wikipedia (CAS Latency) for more on this technology, and check out my January 2004 column ("Choose the Right Kind of Memory for Your System") on choosing memory.

3. Stop saving power: Disable any power-saving settings in your PC Setup program. These may slow hard drives, the CPU, or other system components.

4. Isolate your swap file: Your PC's swap file--or virtual memory--puts data onto the hard drive when your system's RAM gets full. Unfortunately, accessing data on a hard drive is much slower than accessing data stored in RAM. A PC that frequently accesses the swap file for data may suffer a noticeable performance hit.

The best way to speed up swap-file access is to place the file on a second hard drive--ideally one without any other program or operating system files. If you can't put the swap file on its own hard drive, place it in its own drive partition to minimize fragmentation, which also slows memory access. Partitioning software such as Symantec's $70 PartitionMagic 8) makes creating partitions a breeze.

5. Toss your swap file: If your PC has at least 1GB of RAM, you may be able to speed up your PC by disabling the swap file in your virtual memory settings. Simply click No paging file in the Virtual Memory dialog box (see Figure 1). To open your virtual memory settings in Windows XP, right-click My Computer, click Properties, Advanced, choose the Settings button under "Performance", click the Advanced tab, and select the Change button.

6. Get dual drives: Add a second hard drive configured as a RAID 0 array, which will increase your data transfer speeds. Many midrange and high-end motherboards support RAID 0. If your motherboard doesn't, you can add a PCI RAID controller card such as Adaptec's $75 ATA RAID 1200A.

7. Check your AGP settings: Make sure the AGP Speed setting in your PC Setup program matches your graphics chip set's maximum (4X, 8X, and so forth). If your PC supports AGP 4X or 8X, enable AGP Fast Write, which allows graphics data to bypass system RAM.

8. Open the gate: Pick the fastest speed for PC Setup's Gate A20 Emulation setting, to shift the source of a memory timing routine from the slower keyboard circuitry to the faster chip-set circuitry


Free Calls to any Landline or Mobile in the World...

 Check on this cool site and make free calls all over the world...
Daily only 5minutes per call....
This surely works..
But remember head phones are necessary for ur voice to make audible for them....

for more info visit :


make ur pdf files to speak
here r the shortcuts for hearing pdf files in Abobe Acrobat Reader 6.0 or higher

ctrl+shift+b ---->to hear the whole topic
ctrl+shift+v ---->to hear the page


File Size Limit: 500MB 
Download Limit: Unlimited 
File Life: 30 Days (Deleted only if there is no download activity in 30 days) 

File Size Limit: 1.5GB 
Download Limit: Unlimited 
File Life: 25 Days (Deleted only if there is no download activity in 25 days) 

File Size Limit: 500MB 
Download Limit: Unlimited 
File Life: 15 Days (Deleted only if there is no download activity in 15 days) 

Symptoms of a Hacked Computer

Another cool article, i was curious if my comp is hacked so i found this article i hope you will like it

If your computer experiences any of the following symptoms below, you may be infected with an Internet Trojan and hackers may have the ability to invade your computer.

* Computer suddenly starts running slow.
* Settings were changed without your knowledge. Your web browser home page or file information.
* Suddenly slow internet access.
* Additional internet activity detected without you using any programs accessing the internet.
* Abnormal running files/processes in the task manager.

There are several free utilities that users can utilize to check their computer for evidence of being hacked. These utilities look for unusual activity such as the utilization of your TCP and UDP Ports. TCP and UDP ports explained here. A TCP or UDP port is used by programs for transfer of information to other computers on the internet. Below is a list of utilities you can use for basic investigative checks on your computer to tell if you were hacked.

List of free utilities:

PSTools – This is a utility that gives you a list of command lines that can kill/quit processes running on your computer. To completely remove a virus or hacker file you may need command line functions to end a running process of the malicious file.

Fport – This is a utility program that runs from the command line. When it is run it monitors the TCP and UDP ports telling you which program is using which port.

– This utility also listens to the TCP and UDP port activity. It has a graphical user interface (GUI) for easy use. This utility is similar to Fport but with a better front end interface for use.

File Analyzer – This is a tool that allows you to view additional information about any given file. When you do a right-click-properties of a file you can view detailed information of the given file. This arms a user with the ability to better identify a suspicious file type.

Windows boot disk creator – You can create boot disks from the following website: This allows you to boot from a separate disk for removing any corrupted or hacker files on your computer system without them loading into your system during a boot process.

Now that you are armed with all of these wonderful tools. What do you do now?

As a general rule to finding out of your computer is hacked you must know how your computer usually behaves under normal circumstances. This means if it takes a commonly used application an additional 2 minutes to open then you might have a problem. It is always a good practice to familiarize yourself with the list of normal running processes/programs on your computer. You can do this by right-click the taskbar and go to Task Manager and the Processes Tab.



To get a little deep into detecting if your computer has been hacked you can check for the TCP and UDP port activity for any given program. You can use the Fport or TCPView program for this. Since hackers leave files behind to initially hack your system you can run Fport or TCPView to see which program or files are accessing the ports. If you locate the suspicious file and find that it is accessing a TCP or UDP port then it means the file is transferring information to another source. The source is usually the hacker on the other end collecting your personal information in some cases. You must use a boot disk and remove the corrupted file.

If you are trying to locate a file that Fport or TCPView found and you cannot find it in on your hard drive then it may be a hidden file.

To display/show hidden files you must change the setting in your Folder Options. Open up My Computer > Tools menu > Folder Options > View tab > uncheck the box “Hide extensions for known file types” and make sure the bullet for “Show hidden files and folders” is selected. Click OK.

If all else fails with removing hacker files or fixing your computer from being hacked you can format your hard drive and reinstall the operating system as a last resort. We do not recommend you doing as you will lose ALL of your information. In the end it is your call and it is always worth a try to remove the malicious files first.

How Do I Know If I Have Been Hacked? Automatic Removal Instructions

how to identify ur computer is hacked