பல்சுவை தகவல்கள் - Thagavalgal in Tamil பல்சுவை தகவல்கள் - Thagavalgal in Tamil

பல்சுவை தகவல்கள் - Thagavalgal in Tamil- Interesting Information in Tamil Useful Information you should know - Computer Tips, Health Tips, online offers, and more helpful Tips and Tricks நீங்கள் தெரிந்து கொள்ள வேண்டிய பயனுள்ள தகவல்கள்

திங்கள், 10 மார்ச், 2014

Some Important Portals & their Founders

1. Google— Larry Page & Sergey Brin
2. Facebook— Mark Zuckerberg
3. Yahoo— David Filo & Jerry Yang
4. Twitter— Jack Dorsey & Dick Costolo
5. Internet— Tim Berners Lee
6. Linkdin— Reid Hoffman, Allen Blue& Koonstantin Guericke
7. Email— Shiva Ayyadurai
8. Gtalk— Richard Wah kan
9. Whats up— Laurel Kirtz
10. Hotmail— Sabeer Bhatia
11. Orkut— Buyukkokten
12. Wikipedia— Jimmy Wales
13. You tube— Steve Chen, Chad Hurley & JawedKarim
14. Rediffmail— Ajit Balakrishnan
15. Nimbuzz— Martin Smink & Evert Jaap Lugt
16. Myspace— Chris Dewolfe & Tom Anderson
17. Ibibo— Ashish Kashyap
18. OLX— Alec Oxenford & Fabrice Grinda
19. Skype— Niklas Zennstrom,JanusFriis & Reid Hoffman
20. Opera— Jon Stephenson von Tetzchner & Geir lvarsoy
21. Mozilla Firefox— Dave Hyatt & Blake Ross
22. Blogger— Evan Willams

Some Important Portals & their Founders

1. Google— Larry Page & Sergey Brin 2. Facebook— Mark Zuckerberg 3. Yahoo— David Filo & Jerry Yang 4. Twitter— Jack Dorsey & Dick Costolo 5. Internet— Tim Berners Lee 6. Linkdin— Reid Hoffman, Allen Blue& Koonstantin Guericke 7. Email— Shiva Ayyadurai 8. Gtalk— Richard Wah kan 9. Whats up— Laurel Kirtz 10. Hotmail— Sabeer Bhatia 11. Orkut— Buyukkokten 12. Wikipedia— Jimmy Wales 13. You tube— Steve Chen, Chad Hurley & JawedKarim 14. Rediffmail— Ajit Balakrishnan 15. Nimbuzz— Martin Smink & Evert Jaap Lugt 16. Myspace— Chris Dewolfe & Tom Anderson 17. Ibibo— Ashish Kashyap 18. OLX— Alec Oxenford & Fabrice Grinda 19. Skype— Niklas Zennstrom,JanusFriis & Reid Hoffman 20. Opera— Jon Stephenson von Tetzchner & Geir lvarsoy 21. Mozilla Firefox— Dave Hyatt & Blake Ross 22. Blogger— Evan Willams

வியாழன், 6 மார்ச், 2014

How To Find Serial Numbers On Google


Posted by:Arun

ok, this is a little trick that i usually use to find cd keys with google.

if your looking for a serial number for nero (for example) goto google.com and type nero 94FBR and it’ll bring it up
this works great in google

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.

1)The pages that are returned are pages dealing specifically with the product you’re wantinga serial for.
2)Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.
I hope this trick help you finding your ccd keys easily

Enjoy :)

How to create slide shows in HTML5 for Facebook

Posted by: Arun


We have reported several services to create slide shows of photos using photo albums loaded on your Facebook profile. What we announce today is different from the others, however, for both simplicity and functionality but also because it uses the new web standard, HTML5.



SlideMyPics allows you to create slideshows in HTML5 by importing photos from Facebook, Flickr, Picasa, Photobucket or SmugMug. Once you upload the photos (after you have logged in from Facebook), you can organize your photos, add effects, set the transitions from one photo to another, the background music of your choice, the size of the video and more.
Once you have completed your slide show it will be available to be shared on Facebook, Twitter, or to be “embedded” on a website.
The creation of the slideshow takes no more than 5 minutes. LINKS: http://www.slidemypics.com/

Cyber Crime & Types of Cyber Crimes

 Posted by:  Arun

Cyber Crime
Any illegal activity committed using a computer and/or the internet can be called a cyber crime.

12 Types of Cyber Crime

1. HACKING
Hacking is an act committed by an intruder by accessing your computer system without your permission.

2. VIRUS DISSEMINATION
“Viruses” are computer programs that attach themselves to or infect a system or files, and have a tendency to circulate to other computers on a network. They disrupt the computer operation and affect the data stored-either by modifying it or by deleting it altogether.
“Worms” unlike viruses don’t need a host to cling on to. They merely replicate until they eat up all available memory in the system.
“Trojan horses” are different from viruses in their manner of propagation. They masquerade as a legitimate file, such as an email attachment from a supposed friend with a very believable name, and don’t disseminate themselves.

3. LOGIC BOMBS
A logic bomb, also known as “slag code”, is a malicious piece of code which is intentionally inserted into software to execute a malicious task when triggered by a specific event. It’s not a virus, although it usually behaves in a similar manner.


4. DENIAL-OF-SERVICE ATTACK
A Denial-of-Service(DOS) attack is an explicit attempt by attackers to deny service to intended users of that service. It involves flooding a computer resource with more requests than it can handle consuming its available bandwidth which results in server overload. This causes the resource to crash or slow down significantly so that no one can access it.

5. PHISHING
This is a technique of extracting confidential information such as credit card number and username-password combos by masquerading as a legitimate enterprise. Phishing is typically carried out by email spoofing.

6. E-MAIL BOMBING & SPAMMING
“E-mail bombing” is characterized by an abuser sending huge volumes of email to a target address resulting in victim’s email account or mail servers crashing. The message is meaningless and excessively long in order to consume network resources.
“Spamming”  is a variant of email bombing. Here unsolicited bulk messages are sent to a large number of users, indiscriminately. Opening links given in spam mails may lead you to phishing web sites hosting malware. Spam mail may also have infected files as attachments.

7. WEB JACKING
Web jacking derives its name from “hijacking”. Here, the hacker takes control of a web site fraudulently. He may change the content of the original site or even redirect the user to another fake similar looking page controlled by him.

8. CYBER STALKING
Cyber stalking is a new form of internet crime in our society when a person is pursued or followed online. A cyber stalker doesn’t physically follow his victim; he does it virtually by following his online activity to harvest information about the stalkee and harass him or her and make threats using verbal intimidation.

9. DATA DIDDLING
Data Diddling is unauthorised altering of data before or during entry into a computer system, and then changing it back after processing is done.

10. IDENTITY THEFT AND CREDIT CARD FRAUD
“Identity theft” occurs when someone steals your identity and pretends to be you to access resources such as credit cards, bank accounts and other benefits in your name. The imposter may also use your identity to commit other crimes.
“Credit card fraud” is a wide ranging term for crimes involving identity theft where the criminal uses your credit card to fund his transactions. Credit card fraud is identity theft in its simplest form.

11. SALAMI SLICING ATTACK
A “salami slicing attack” or “salami fraud” is a technique by which cyber-criminals steal money or resources a bit at a time so that there’s no noticeable difference in overall size. The perpetrator gets away with these little pieces from a large number os resources and thus accumulates a considerable amount over a period of time.

12. SOFTWARE PIRACY
Software piracy is the unauthorised use and distribution of computer software. Software developers work hard to develop these programs, and piracy curbs their ability to generate enough revenue to sustain application development. This affects the whole global economy as funds are relayed from other sectors which results in less investment in marketing and research.

share and comment  PLz

20 Great Google Secrets


Google is clearly the best general-purpose search engine on the Web (seewww.pcmag.com/searchengines

But most people don’t use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google’s index, it’s still a struggle to pare results to a manageable number.
But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google’s search options go beyond simple keywords, the Web, and even its own programmers. Let’s look at some of Google’s lesser-known options.

Syntax Search Tricks
Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at
www.google.com/help/operators.html

. Here are some advanced operators that can help narrow down your search results.
Intitle: at the beginning of a query word or phrase (intitle:”Three Blind Mice”) restricts your search results to just the titles of Web pages.
Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you’re searching for might commonly appear in URLs. If you’re looking for the term HTML, for example, and you don’t want to get results such as
www.mysite.com/index.html
, you can enter intext:html.
Link: lets you see which pages are linking to your Web page or to another page you’re interested in. For example, try typing in
link:http://www.pcmag.com

Try using site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:”Mark Twain”site:edu. Experiment with mixing various elements; you’ll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.
Swiss Army Google
Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature
(www.google.com/help/features.html#calculator)
lets you do both math and a variety of conversions from the search box. For extra fun, try the query “Answer to life the universe and everything.”

Let Google help you figure out whether you’ve got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try “thre blund mise”) and Google may suggest a proper spelling. This doesn’t always succeed; it works best when the word you’re searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you’re searching for “three blind mice,” underneath the search window will appear a statement such as Searched the web for “three blind mice.”) You’ll discover that you can click on each word in your search phrase and get a definition from a dictionary.
Suppose you want to contact someone and don’t have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you’ll see it at the top of the search results along with a map link to the address. If you’d rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you’d rather use a search form for business phone listings, try

Yellow Search
(www.buzztoolbox.com/google/yellowsearch.shtml).
Extended Googling
Google offers several services that give you a head start in focusing your search. Google Groups
(http://groups.google.com)
indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: Froogle

CODE
(http://froogle.google.com),
which indexes products from online stores, and Google Catalogs
CODE
(http://catalogs.google.com),
which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google’s tools and services at
www.google.com/options/index.html

You’re probably used to using Google in your browser. But have you ever thought of using Google outside your browser?
Google Alert
(www.googlealert.com)
monitors your search terms and e-mails you information about new additions to Google’s Web index.

(Google Alert is not affiliated with Google; it uses Google’s Web services API to perform its searches.) If you’re more interested in news stories than general Web content, check out the beta version of Google News Alerts
(www.google.com/newsalerts).

This service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)
Google on the telephone? Yup. This service is brought to you by the folks at Google Labs
(http://labs.google.com),
a place for experimental Google ideas and features (which may come and go, so what’s there at this writing might not be there when you decide to check it out). With Google Voice Search
(http://labs1.google.com/gvs.html),
you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don’t expect 100 percent success.
In 2002, Google released the Google API (application programming interface), a way for programmers to access Google’s search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you’ll need an API key, which is available free from

CODE
www.google.com/apis
. See the figures for two more examples, and visit
www.pcmag.com/solutions
for more.
Thanks to its many different search properties, Google goes far beyond a regular search engine. Give the tricks in this article a try. You’ll be amazed at how many different ways Google can improve your Internet searching.
Online Extra: More Google Tips
Here are a few more clever ways to tweak your Google searches.

Search Within a Timeframe
Daterange: (start date–end date). You can restrict your searches to pages that were indexed within a certain time period. Daterange: searches by when Google indexed a page, not when the page itself was created. This operator can help you ensure that results will have fresh content (by using recent dates), or you can use it to avoid a topic’s current-news blizzard and concentrate only on older results. Daterange: is actually more useful if you go elsewhere to take advantage of it, because daterange: requires Julian dates, not standard Gregorian dates. You can find converters on the Web (such as
CODE
http://aa.usno.navy.mil/data/docs/JulianDate.html
excl.gif No Active Links, Read the Rules – Edit by Ninja excl.gif
), but an easier way is to do a Google daterange: search by filling in a form at
www.researchbuzz.com/toolbox/goofresh.shtml or www.faganfinder.com/engines/google.shtml
. If one special syntax element is good, two must be better, right? Sometimes. Though some operators can’t be mixed (you can’t use the link: operator with anything else) many can be, quickly narrowing your results to a less overwhelming number.

More Google API Applications
Staggernation.com offers three tools based on the Google API. The Google API Web Search by Host (GAWSH) lists the Web hosts of the results for a given query
(www.staggernation.com/gawsh/).

When you click on the triangle next to each host, you get a list of results for that host. The Google API Relation Browsing Outliner (GARBO) is a little more complicated: You enter a URL and choose whether you want pages that related to the URL or linked to the URL
(www.staggernation.com/garbo/).
Click on the triangle next to an URL to get a list of pages linked or related to that particular URL. CapeMail is an e-mail search application that allows you to send an e-mail to google@capeclear.com with the text of your query in the subject line and get the first ten results for that query back. Maybe it’s not something you’d do every day, but if your cell phone does e-mail and doesn’t do Web browsing, this is a very handy address to know.

How to Create a Nameless Folder

Posted by: Arun
 
Before attempting this trick, try to make a folder with no name and you will fail to do so. This is what this trick will let you do.
  1. Make a Newfolder on desktop or where ever you want.
  2. Right click on this newly created folder and select Rename.
  3. Erase the text showing “New Folder”.
  4. Now keep Pressing Alt (i.e alter key) and type 255. If you are on laptop then you need to enable your Num Lock and type from the highlighted number keys not from those below function keys.
  5. After that leave alt key and Press enter.
  6. Done you just created nameless folder.

How to run your PCs Clean, Safe and Fast?




CCleaner may be a terribly economical and straightforward to use utility that cleans and optimizes your laptop to make sure best performance and freedom from malware.

How it Works
The beauty of free transfer CCleaner is that the speed at that it carries out the varied scans and fixes. Its main purpose is to wash any superfluous files from your hard-drive and on gap the program you see the varied aspects of Windows that you just will search through and clear. CCleaner also will notice your put in applications that will hold on to files that are not any longer any use, like Google Earth histories or Flash Player configurations. The uninstaller is maybe additional helpful, and additional powerful, than Windows own uninstaller though use it with care! If you do not apprehend what associate entry relates to within the program list, leave it alone to get on the safe aspect otherwise you may end-up removing important parts.
Quality
When you install CCleaner, it’ll prompt you whether or not you wish to put in Google Chrome further and whether or not you wish to use CCleaner to preserve cookies that you just use frequently to log-onto websites, security checks etc.
The interface in CCleaner is incredibly straightforward to navigate and before taking any action, you may perpetually be asked to verify that you just area unit certain concerning what you wish to try to to. there’s a helpful written record Checker that may quickly check its integrity, and allow you to fix dangerous entries when creating a backup. CCleaner’s uninstall and startup tools area unit terribly handy to own overall and easily boost the usability of this terribly rounded very little maintenance assistant.
The most recent unharness of CCleaner currently comes with a Drive Wiper. Drive Wiper will be accessed within the Tools section of CCleaner and permits you to settle on whether or not to wash solely free area or a complete drive victimisation 3 levels of strength – Department of Defense-level three-pass possibility, a National Security Administration-level seven-pass cleanup or a 35-pass Gutmann-level deep scrub.
There’s additionally improved support for cleanup files left behind by Google Chrome and web person nine. internet Apps that use HTML5 information storage also are currently enclosed in CCleaner’s cleanup method. Finally, a number of additional System directories are targeted for cleanup and CCleaner currently supports sixty four bit machines.

Plz Download = =>https://www.piriform.com/ccleaner/download

 Share & Comment PLz

புதன், 5 மார்ச், 2014

7 Cool Notepad Tricks to Scare your Friends.



We all know Notepad. It's a simple text editor. But today I am going to discuss some cool tricks which you can perform on your computer using simple notepad. You can use these tricks to scare your friends. 

Please Note -  These tricks will not harm your computer in anyway. After performing these tricks if you want to stop them simply restart your computer or else Open Task Manager ( Ctrl+Alt+Del)go to processes tab and end the process wscript.exe.

1) Continuously Pop out CD or DVD Drive:
  • Open Notepad.
  • Copy the code bellow.
Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop
  • Now save as abc.vbs 
  • Send it to your friend now.
 2) Toggle Caps Lock button On-Off Continuously : 
  • Open Notepad.
  • Copy the following code.

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop
  • Save it as abc.vbs
  • And send it to your friends.
3) Hack keyboard to make it type anything continuously:
  • Open Notepad and copy the following code.
Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop
  • You can change You are a fool. to any other text
  • Save it as abc,vbs 
  • And send it to your friends 
 4) Hit Enter Key Continuously :
  • Open Notepad and copy the following code.
    Set wshShell = wscript.CreateObject("WScript.Shell")
    do
    wscript.sleep 100
    wshshell.sendkeys "~(enter)"
    loop
    • Save it as abc.vbs
    • Now sent it to your friends.
    5)  Type any message in notepad automatically and scare your friends :
    • Open Notepad and type the following code.
      

    WScript.Sleep 1800
    WScript.Sleep 1000
    Set WshShell = WScript.CreateObject("WScript.Shell")
    WshShell.Run "notepad"
    WScript.Sleep 100
    WshShell.AppActivate "Notepad"
    WScript.Sleep 500
    WshShell.SendKeys "Hel"
    WScript.Sleep 500
    WshShell.SendKeys "lo "
    WScript.Sleep 500
    WshShell.SendKeys ", ho"
    WScript.Sleep 500
    WshShell.SendKeys "w a"
    WScript.Sleep 500
    WshShell.SendKeys "re "
    WScript.Sleep 500
    WshShell.SendKeys "you"
    WScript.Sleep 500
    WshShell.SendKeys "? "
    WScript.Sleep 500
    WshShell.SendKeys "I a"
    WScript.Sleep 500
    WshShell.SendKeys "m g"
    WScript.Sleep 500
    WshShell.SendKeys "ood"
    WScript.Sleep 500
    WshShell.SendKeys " th"
    WScript.Sleep 500
    WshShell.SendKeys "ank"
    WScript.Sleep 500
    WshShell.SendKeys "s! "
    • Now save it as abc.vbs
    • And send it to your friends.
    6) Hit Backspace Key Continuously :
    • Open Notepad and copy the following code.
    MsgBox "Let's go back a few steps"
    Set wshShell =wscript.CreateObject("WScript.Shell")
    do
    wscript.sleep 100
    wshshell.sendkeys "{bs}"
    loop
    • Save it as abc.vbs and send it to your friends.
    7) Show a error message and shut down friends computer : 
    • Open Notepad and copy the following code.
    @echo off
    msg * I don't like you
    shutdown -c "Error! You are too stupid!" -s
    • Save it as abc.vbs and send to your friends.
    Any questions feel free to comment.

    Convert text into audio using Notepad


    Notepad ; a simple programme. But we can do lot's of things with this. I gave you more tricks from notepad here before. Today I am going to tell you another notepad trick. If you want to convert your text in to audio you have to use any programmes. But from this method you don't want to use another software.  An easy trick from Notepad.
    Let's start.
    • Open notepad.
    • Copy the code bellow.


    Dim msg, sapi
    msg=InputBox("Enter your text for Conversation | Tool by Irshad (http://pctricksonline.blogspot.com)","PC Hacks Text-To-Audio Converter")
    Set sapi=CreateObject("sapi.spvoice")
    sapi.Speak msg



    • Now save it as text_audio.vbs
    • And that's it.
    • Now open the file and type anything. Then click OK.
    Don't forget to comment.


    Find Lost Mobile Phone Using IMEI Number

    Hello friends, today I am going to share a post to find your lost mobile phone using IMEI number. This post is shared by Sai Hackers on my email id. Before I start let me provide a little info on IMEI number. IMEI number is short form of international manufacturer equipment identity. It is 15 digit unique number. If you are using call , SMS or gprs services on your mobile handset then IMEI number is helping you in this. Without IMEI number you can’t use theses services. I hope it is enough info about IMEI number but still you want to know more then Google is alive just use it. OK now starts the method shared by Arun to find lost mobile phone using IMEI number.
    STEP 1:

    First of all you need 15 digit IMEI number of that mobile phone which you have lost sadly. You can find your phone IMEI number on your phone bill as well as box of your phone.
    STEP 2:

    Now note down that IMEI number and go to your email id because we are going to send an email.
    STEP 3:

    Now compose a new email by providing following info.
    Your name:
    Address:
    Phone model:
    Make:
    Last used No.:
    E-mail for communication:
    Missed date:
    IMEI No.: 
    and send this email to this email id: cop@vsnl.net




    Now just wait for reply from cop@vsnl.net. If your phone in use then they will trace it out and inform you shortly.

    Popular Posts

    Facebook

    Blog Archive