Sunday, 14 December 2014

All Amazing Emoticons

List of emoticons

Western-

Western style emoticons are mostly written from left to right as though the head is rotated counter-clockwise 90 degrees. One will most commonly see the eyes on the left, followed by the nose (often not included) and then the mouth. Typically, a colon is used for the eyes of a face, unless winking, which uses a semicolon. However, an equal sign, a number 8, and a capital letter B are also used interchangeably to refer to normal eyes, widened eyes, or those with glasses. One can also add a "}" after the mouth symbol-"(", ")", etc.—to indicate a beard.

Icon Meaning
:-) :) :D :o) :] :3 :c) :> =] 8) =) :} :^) :っ) Smiley or happy face.
:-D 8-D 8D x-D xD X-D XD =-D =D =-3 =3 B^D Laughing, big grin, laugh with glasses
:-)) Very happy or double chin
>:[ :-( :(  :-c :c :-<  :っC :< :-[ :[ :{ Frown sad
;( Winky frowny, used to signify sadness, with a bit of sarcasm. It is easily misunderstood.
:-|| :@ >:( Angry
:'-( :'( Crying
:'-) :') Tears of happiness
D:< D: D8 D; D= DX v.v D-': Horror, disgust, sadness, great dismay
>:O :-O :O :-o :o 8-0 O_O o-o O_o o_O o_o O-O Surprise, shock, yawn
:* :^* ( '}{' ) Kiss, couple kissing
;-) ;) *-) *) ;-] ;] ;D ;^) :-, Wink, smirk
>:P :-P :P X-P x-p xp XP :-p :p =p :-Þ :Þ :þ :-þ :-b :b d: Tongue sticking out, cheeky/playful, blowing a raspberry
>:\ >:/ :-/ :-. :/ :\ =/ =\ :L =L :S >.< Skeptical, annoyed, undecided, uneasy, hesitant
:| :-| Straight face no expression, indecision
:$ Embarrassed, blushing
:-X :X :-# :# Sealed lips or wearing braces
O:-) 0:-3 0:3 0:-) 0:) 0;^) Angel, saint, innocent
>:) >;) >:-) Evil
}:-) }:) 3:-) 3:) Devilish
o/\o ^5 >_>^ ^<_< High five
|;-) |-O Cool, bored/yawning
:-J Tongue-in-cheek
:-& :& Tongue-tied
#-) Partied all night
%-) %) Drunk, confused
:-###.. :###.. Being sick
<:-| Dumb, dunce-like
ಠ_ಠ Look of disapproval The Unicode character ಠ is from the Kannada alphabet and can be called differently in HTML notation: &#3232; and &#x0CA0; (for Unicode)
<*)))-{ ><(((*> ><> Fish, something's fishy, Christian fish
\o/ Cheer "Yay, yay."
*\0/* Cheerleader
@}-;-'--- @>-->-- Rose
~(_8^(I) Homer Simpson
5:-) ~:-\ Elvis Presley
//0-0\\ John Lennon
*<|:-) Santa Claus
=:o] Bill Clinton
,:-) 7:^] Ronald Reagan
<3 </3 Heart and broken-heart (reverse-rotation)



Eastern

Eastern emoticons generally are not rotated, and may include non-Latin characters to allow for additional complexity.

 

Icon Meaning
(>_<) (>_<)> Troubled
(';') Baby
(^^ゞ (^_^;) (-_-;) (~_~;) (・。・;) (・_・;) (・・;) ^^; ^_^; (#^.^#) (^ ^;) Nervous, embarrassed, troubled, shy, sweat drop
.。o○ ○o。. Bubbles
<コ:彡 Squid
(^。^)y-.。o○ (-。-)y-゜゜゜ Smoking
(-_-)zzz Sleeping
(^_-) (^_-)-☆ Wink
((+_+)) (+o+) (゜゜) (゜-゜) (゜.゜) (゜_゜) (゜_゜>) (゜レ゜) Confused
(o|o) Ultraman 
<(`^´)>
^_^ (゜o゜) (^_^)/ (^O^)/ (^o^)/ (^^)/ (≧∇≦)/ (/◕ヮ◕)/ (^o^)丿 ∩( ・ω・)∩ ( ・ω・) ^ω^ Joyful
(__) _(._.)_ _(_^_)_ <(_ _)> <m(__)m> m(__)m m(_ _)m Kowtow as a sign of respect, or dogeza for apology
(゜゜)~ Tadpole
( ^^) _U~~ ( ^^) _旦~~ Cup of tea
☆彡 ☆ミ Shooting star
\(゜ロ\)ココハドコ? (/ロ゜)/アタシハダアレ? "Where am I?", "Who am I?"
>゜)))彡 (Q )) ><ヨヨ (゜))<< >゜))))彡 <゜)))彡 >゜))彡 <+ ))><< <*)) >=< Fish
('_') (/_;) (T_T) (;_;) (;_; (;_:) (;O;) (:_;) (ToT) (T▽T) ;_; ;-; ;n; ;; Q.Q T.T QQ Q_Q Sad, crying
(ー_ー)!! (-.-) (-_-) ( 一一) (;一_一) Shame
C:。ミ Octopus
(=_=) Tired
~>゜)~~~  Snake
~゜・_・゜~  Bat
(=^・^=) (=^・・^=) =^_^= Cat
(..) (._.) Looking down
^m^
(・・? (?_?) Confusion
>^_^< <^!^> ^/^ (*^_^*) §^。^§ (^<^) (^.^) (^ム^) (^・^) (^。^) (^_^.) (^_^) (^^) (^J^)
(*^。^*) ^_^ (#^.^#) (^-^)
Normal laugh
(^^)/~~~ (^_^)/~ (;_;)/~~~ (^.^)/~~~ ($・・)/~~~ (@^^)/~~~ (T_T)/~~~ (ToT)/~~~ Waving
●~* Bomb
(V)o¥o(V) Alien Baltan
\(~o~)/ \(^o^)/ \(-o-)/ ヽ(^。^)ノ ヽ(^o^)丿 (*^0^*) Excited
(*_*) (*_*; (+_+) (@_@) (@_@。 (@_@;) \(◎o◎)/! Amazed
(-_-)/~~~ピシー!ピシー!
 !(^^)!
(*^^)v (^^)v (^_^)v (^▽^) (・∀・) ( ´∀`) (⌒▽⌒) (^v^) (’-’*) Laughing, cheerful
(~o~) (~_~)
(^^ゞ
(p_-)
((d[-_-]b)) Headphones/listening to drum and bass music.
(-"-) (ーー゛) (^_^メ) (-_-メ) (`´) (~_~メ) (--〆) (・へ・) <`~´> <`ヘ´> (ーー;) Worried
(^0_0^) Eyeglasses
( ..)φメモメモ φ(..)メモメモ Note
 :-P :-O |:3ミ :-> 8-< :-) :-< :( :-( :) :| :-|
(●^o^●) (^v^) (^u^) (^◇^) ( ^)o(^ ) (^O^) (^o^) (^○^) )^o^( (*^▽^*) (✿◠‿◠) Happy
( ̄ー ̄) Grinning
( ̄□ ̄;)°o° °O° :O o_O o_0 o.O (o.o) Surprised
(*´▽`*) (*°∀°)=3 Infatuation
( ゚ Д゚) (゜◇゜) Shocked, surprised
(* ̄m ̄) Dissatisfied
ヽ(´ー`)┌ ¯\_(ツ)_/¯ Mellow, shrug
(´・ω・`) (‘A`) Snubbed or deflated
(*^3^)/~☆ Blowing a kiss
.....φ(・∀・*) Studying is good
キタ━━━(゜∀゜)━━━!!!!!  "It's here", Kitaa!, a general expression of excitement that something has appeared or happened.
_| ̄|○ STO OTZ OTL orz Despair. The "O" or "o" represents one's head on the ground, "T" or "r" forms the torso and "S" or "Z" forms the legs.
(╯°□°)╯︵ ┻━┻ ┬──┬ ¯\_(ツ) ┻━┻ ︵ヽ(`Д´)ノ︵ ┻━┻ ┬─┬ノ( º _ ºノ) (ノಠ益ಠ)ノ彡┻━┻ Table flip


2channel emoticons

Main article: Emoticon § 2channel style
The Japanese language is usually encoded using double-byte character codes, which can be reproduced as ASCII art.
Icon Meaning
m9(^Д^) Jeering laughter
m(_ _)m Kowtow as a sign of respect, or dogeza for apology
(´・ω・`) Snubbed or deflated
<`∀´> or <丶`∀´> Stereotypical Korean character (Nidā)
[ (★) ]
<丶´Д`>
Stereotypical North Korean character (Kigā)  
∧_∧
( ;´Д`)
Stereotypical Japanese character (Monā)  
∧∧
/ 中\
(  `ハ´)
Stereotypical Chinese character (Sinā)  
∧∧
 / 台\
 ( ^∀^)
Stereotypical Taiwanese character (Wanā)
∧∧
/ 越 \
( ・∀・ )
Stereotypical Vietnamese character (Venā)
γ~三ヽ
(三彡0ミ)
( ´∀`)
Stereotypical Indian Character (Monastē)
| ̄ ̄|
_☆☆☆_
( ´_⊃`)
Stereotypical American character (Samū)
 ┏━┓
━━━━━━
ミΘc_Θ-ミ
Stereotypical Jewish character (Yudā)
__
│〓.│
━━━━━
ミ ´_>`)
Stereotypical English character (Jakū)
____
(〓__>
ξ ・_>・)
Stereotypical French character (Torirī)
_、,_
ミ  _⊃)
Stereotypical German character (Gerumandamu)
≡≡彡
彡 ´_)` )
Stereotypical Austrian character (Osutō)
,,,,,,,,,,,,,
 ミ;;;,,,,,,,ミ 
( `_っ´)
Stereotypical Russian character (Rosukī)
_γ⌒ヽ_
lXXXXXXXXl
 ( ´m`)
Stereotypical Mexican character (Amīgo)
_
<(o0o)>
(>ミ - ミ )>
Stereotypical Persian character (jujø)
(`・ω・´) Feel perky
_| ̄|○ Given up
(`-´)> Salute
(´;ω;`) Terribly sad
ヽ(´ー`)ノ Peace of mind
ヽ(`Д´)ノ Be irritable
(#゚Д゚) Angry
( ´Д`) Yelling, or panting
( ゚Д゚) Surprised, or loudmouthed
┐('~`;)┌ Don't know the answer
(´∀`) Carefree
( ´_ゝ`) Indifferent
Σ(゜д゜;) Shocked
( ゚ヮ゚) Happy, upbeat  

キタ━━━(゜∀゜)━━━!!!!!  "It's here", Kitaa!, a general expression of excitement that something has appeared or happened or "I came".
キタワァ*・゜゚・*:.。..。.:*・゜(n‘∀‘)η゚・*:.。. .。.:*・゜゚・* !!!!!   Girlish version of "It's here".
⊂二二二( ω)二⊃ "Bu-n", being carefree and above, with arms stretched out while running/soaring.
(*´Д`)ハァハァ Erotic stirring, haa haa
( ´Д`)ノ(´・ω・`) ナデナデ Patting, nade nade
(((( ;゚Д゚))) Spook
Σ(゚Д゚) Huge surprise
( ´∀`)σ)∀`) Jog someone's cheek
(・∀・ )ヾ(- -;)コラコラ Blaming "now now"
( ゚д゚) Amazed
(´ー`)y-~~ Smoking
( ^_^)o自自o(^_^ ) Toast "Cheers"
m9(・∀・) Flash of intuition
ヽ(´ー`)人(´∇`)人(`Д´)ノ Friendly
('A`) Lonely
( ´,_ゝ`) Depressed, unsatisfied (based on indifferent)
(´-`).。oO( ... ) Thinking
(゚Д゚;≡;゚Д゚) Impatience
( ´д)ヒソ(´Д`)ヒソ(Д` ) Whispers
(・∀・)つ⑩ Carrying money
⊂(゚Д゚⊂⌒`つ≡≡≡(´⌒;;;≡≡≡ Sliding on belly, "whooaaa!!!"
(゚д゚) Unforeseen
(゚⊿゚) "I don't need it"
щ(゚Д゚щ)(屮゚Д゚)屮 Come on
(・∀・) Mocking, "good"
(・A・) "That's bad"
(゚∀゚) Discharged drug-in-brain, goofing around, "A-HYA!"
( つ Д `) Sad
エェェ(´д`)ェェエ Not convincing
( ̄ー ̄) Simper, Snorlax
( ゚∀゚)アハハ八八ノヽノヽノヽノ \ / \/ \ Evil laugh (literally ahahaHAHA...)
[゚д゚] Deflagged
♪┏(・o・)┛♪┗ ( ・o・) ┓♪┏ ( ) ┛♪┗ (・o・ ) ┓♪┏(・o・)┛♪ Happy expressions, dancing to the music
d(*⌒▽⌒*)b Happy expression
_| ̄|○, STO or OTZ or OTL Despair. The "O" or "o" represents one's head on the ground, "T" or "r" forms the torso and "S" or "z" forms the legs.
(╬ ಠ益ಠ) Extreme Distaste, meant to appear as an exaggerated grimace
(≧ロ≦) Shouting
(ΘεΘ;) Pretending not to notice, asleep because of boredom
お(^o^)や(^O^)す(^。^)みぃ(^-^)ノ゙ Kana reading "O ya su mi" meaning "Good night" or "Night"
(*゚ノO゚)<オオオオォォォォォォォーーーーーイ! Calling out, "Ooooi!"
\|  ̄ヘ ̄|/_______θ☆( *o*)/ Kick
(‐^▽^‐)オーホッホ Chuckle
┌(;`~,)┐ Discombobulated
ε=ε=ε=┌(;*´Д`)ノ Running
ヽ(´▽`)/ Happy
^ㅂ^ Happy
(l'o'l) Shocked
ヽ(o`皿′o)ノ really angry
o/ o_ o/ o_ "It's here"
(☞゚ヮ゚)☞ or ☜(゚ヮ゚☜) "Do it"
☜(⌒▽⌒)☞ Angel
( ͡° ͜ʖ ͡°) Smug, pleased with self. Typically used to spam forums.


Miscellaneous Symbols (partial)
Unicode.org chart (PDF)
  0 1 2 3 4 5 6 7 8 9 A B C D E F
U+263x
Notes
1.^ As of Unicode version 6.0
Emoticons
Official Unicode Consortium code chart (PDF)
  0 1 2 3 4 5 6 7 8 9 A B C D E F
U+1F60x 😀 😁 😂 😃 😄 😅 😆 😇 😈 😉 😊 😋 😌 😍 😎 😏
U+1F61x 😐 😑 😒 😓 😔 😕 😖 😗 😘 😙 😚 😛 😜 😝 😞 😟
U+1F62x 😠 😡 😢 😣 😤 😥 😦 😧 😨 😩 😪 😫 😬 😭 😮 😯
U+1F63x 😰 😱 😲 😳 😴 😵 😶 😷 😸 😹 😺 😻 😼 😽 😾 😿
U+1F64x 🙀 🙁 🙂

🙅 🙆 🙇 🙈 🙉 🙊 🙋 🙌 🙍 🙎 🙏
Notes
1.^ As of Unicode version 7.0
2.^ Grey areas indicate non-assigned code points

Tuesday, 7 October 2014

Free airtel 3G trick to use unlimited 3G for free on Airtel

Today I will be sharing a new Airtel 3G trick which you let you access downloading and surfing with 3G for free. Yes !! Its free. Airtel 3G is one of the best 3G service providers with presence in almost all over India. But with increasing popularity,their 3G tariffs have also gone very high.
There are various proxy tricks available on net which are used to access free 3G but they are too complicated to use. So, today I am telling you a very simple free Airtel 3G trick which you can use to download and surf for free with high speed. Also, there will be no speed capping as it happens when we use proxy to access free Airtel 3G internet. Its a direct connection to Airtel 3G without any proxy or VPN. This free airtel 3G trick will work in android phones and PC. Free Airtel 3G internet trick For Android users

    1. Download airtel 3G configuration settings and extract it to SD card. Download the configuration settings here.

  • Go to Google Play store and search for Droid VPN or simply click  Here. 
  • Install Droid VPN to your android device and open it.
  • Add Airtel 3G VPN Config to open Vpn folder.
  • Its done. Just run the application and enjoy
  • For PC users

  • Download the cofiguration settings from the above link.
  • Download and install NmdVPN from here and put the configuration settings file (after extracting) in
    C:Program FilesNMDVPNconfig
  • Now , run NMD VPN as administrator.
  • Just connect and enjoy !!
You can surf and download for free and unlimited using this free airtel 3G trick. Feel free to comment if you have any problem using this trick.
Note :- The configuration file link and NMD VPN download links has been updated with the latest versions which are tested and working in August 2014

How to hack credit or debit cards password Online

Hello Friends,
 today i will explain you how the credit cards hack works. How hackers hack the credit cards using packet sniffing and session Hijacking. In this tutorial we will discuss how we can exploit the vulnerability in credit or debit card functionality to hack the credit or debit cards password. Nowadays Internet banking and credit cards are very common methods of funds transfer and online shopping. And the most interesting thing is that it is done over SSL. So people always have a misconception that their accounts cannot be hacked as their transactions are secured by extra security Layer i.e. SSL but its quite easy to break the SSL. So its always better to secure your computer and internet connection rather than depending on payment sites . So guys first of all we should know How the Credit cards work and how transactions performed. So guys read on..

First of guys let me tell you its virtually impossible to see the actual data that is transferring during a transaction but using session hijacking and packet sniffing we can achieve that but that also is in the encrypted format so if we are able to get that then we can move to further step to crack the encrypted data. So lets start the tutorial...


What really is attack?
The fatal flaw that enabled the sensitive information to be stolen is possible when an end-user is not properly educated on an easy to do and well-known SSL exploit – SSL MITM. The hackers take benefit of that to get access your sensitive data. As its a great saying PREVENTION IS BETTER THAN CURE. So an properly educated end user is really the requirement so that he can block all loopholes in the system. I have already shared two articles with you about how to secure yourself. First one is Make your computer 100% hacker proof and other is 10 easy tips to secure your computer

How the Hack works and How to do it?
First thing i will tell you hacking credit or debit cards is illegal and it will result in serious consequences like 10 years imprisonment and much more. This tutorial is for educational purposes only. I am explaining this tutorial is just to make you aware that how it works.


How the hacker will do it?? suppose you are using a wifi connection to connect to internet. Now what hacker will do it will hack your wifi network and connect to it. He runs a series of utilities to redirect other user’s data through his machine. He runs a number of other utilities to sniff the data, act as an SSL Certificate Server and to be the Man-the-Middle. 
An important concept to grasp here is that a certificate is used to establish the secure SSL connection. This is a good thing, if you have a good certificate and are connecting directly to the website to which you intended to use. Then all your data is encrypted from your browser to the SSL website where the bank’s website will use the information from the certificate it gave you to decrypt your data/credentials. If that is truly the case, then it is pretty darn hard for a hacker to decrypt the data/credentials being transmitted, even if he is able to sniff your data.

This is a bad thing if you have a “Fake” certificate being sent from the hacker, and you are actually connecting to his machine, not directly to the bank’s website. In this case, your credentials are being transmitted between your browser and the hacker’s machine. The hacker is able to grab that traffic, and, because he gave you the certificate to encrypt the data/credentials, he can use that same certificate to decrypt your data/credentials.

 EXACT STEPS TO HACK CREDIT CARDS OR DEBIT CARDS
 The first thing he would do is turn on Fragrouter, so that his machine can perform IP forwarding 

After that, he’ll want to direct your Wi-Fi network traffic to his machine instead of your data traffic going directly to the Internet. This enables him to be the “Man-in-the-Middle” between your machine and the Internet. Using Arpspoof, a real easy way to do this, he determines your IP address is 192.168.1.15 and the Default Gateway of the Wi-Fi network is 192.168.1.1.


The next step is to enable DNS Spoofing via DNSSpoof.

Since he will be replacing the Bank's or Online Store’s valid certificate with his own fake one, he will need to turn on the utility to enable his system to be the Man-in-the-Middle for web sessions and to handle certificates. This is done via webmitm
 

At this point, he is setup and ready to go, he now needs to begin actively sniffing your data passing through his machine including your login information and credit card info. He opts to do this with Ethereal, then saves his capture.

He now has the data, but it is still encrypted with 128-bit SSL. No problem, since he has the key. What he simply needs to do now is decrypt the data using the certificate that he gave you. He does this with SSL Dump

The data is now decrypted and he runs a Cat command to view the now decrypted SSL information. Note that the username is “Bankusername” and the password is “BankPassword”. Conveniently, this dump also shows that the Banking site as National City. FYI, the better, more secure banking and online store websites will have you first connect to another, preceeding page via SSL, prior to connecting to the page where you enter the sensitive information such as bank login credentials or credit card numbers. The reason for this is to stop the MITM-type attack. How this helps is that if you were to access this preceeding page first with a "fake" certificate and then proceeded to the next page where you were to enter the sensitve information, that page where you would enter the sensitive information would not display. That is because the page gathering the sensitive information would be expecting a valid certificate, which it would not receive because of the Man-in-the-Middle. While some online banks and stores do implement this extra step/page for security reasons, the real flaw in this attack is the uneducated end-user, as you'll soon see


With this information, he can now log into your Online Banking Account with the same access and privileges as you. He could transfer money, view account data, etc.

Below is an example of a sniffed SSL credit card purchase/transaction. You can see that Elvis Presley was attempting to make a purchase with his credit card 5440123412341234 with an expiration date of 5/06 and the billing address of Graceland in Memphis, TN (He is alive!). If this was your information, the hacker could easily make online purchases with your card. 


Also Real Bad News for SSL VPN Admins

This type of attack could be particularly bad for corporations. The reason for this is that Corporate SSL VPN solutions are also vulnerable to this type of attack. Corporate SSL VPN solutions will often authenticate against Active Directory, the NT Domain, LDAP or some other centralized credentials data store. Sniffing the SSL VPN login then gives an attacker valid credentials to the corporate network and other systems.

What an End-User Needs To Know

There’s a big step and end-user can take to prevent this from taking place. When the MITM Hacker uses the “bad” certificate instead of the “good”, valid certificate, the end-user is actually alerted to this. The problem is that most end-users don’t understand what this means and will unknowingly agree to use the fake certificate. Below is an example of the Security Alert an end-user would receive. Most uneducated end-users would simply click “Yes”… and this is the fatal flaw:

By clicking “Yes”, they have set themselves up to be hacked. By clicking the “View Certificate” button, the end-user would easily see that there is a problem. Below are examples of the various certificate views/tabs that show a good certificate compared to the bad certificate:  


How an End-User Can Prevent This


  • Again, the simple act of viewing the certificate and clicking “No” would have prevented this from happening.
  • Education is the key for an end-user. If you see this message, take the time to view the certificate. As you can see from the examples above, you can tell when something doesn’t look right. If you can’t tell, err on the side of caution and call your Online Bank or the Online store.
  • Take the time to read and understand all security messages you receive. Don’t just randomly click yes out of convenience.

How a Corporation Can Prevent This


  • Educate the end-user on the Security Alert and how to react to it.
  • Utilize One Time Passwords, such as RSA Tokens, to prevent the reuse of sniffed credentials.
  • When using SSL VPN, utilize mature products with advanced features, such as Juniper’s Secure Application Manager or Network Connect functionality. 


 


Create A Free Dial-Up Connection

For those who are interested, there are free internet connection opportunities available. Even if you already have a cable connection, a backup dial-up connection comes in handy when your cable goes down for a period of time.

There is no special software to install like most ISP's require. One benefit to this is no cumbersome program hogging space and memory resources to run.

Here is a link with a list of some free ISP's http://www.freecenter.com/dialup.html (This link does have a pop-up.)

When you check out a free access site look for their list of access numbers (and their terms of use). You will need to choose a telephone number to make your connection. Be sure to choose a number that will not be a toll call for you to dial. If you are unsure whether a number is toll free or not it's best to check with your telephone company.

When you find a free ISP that serves your area you will need to create an account with them. This account will provide you with your user name and password in order to log-in and browse the internet.

Write down your username, password and access number as you will need these when you create your connection from your pc.

A check list of what you need:


  • Land-line

  • Dial-up modem installed in your computer. (Most computers come with one installed already. If your computer has previously accessed the internet via dial-up then you should be good to go. This tutorial is assuming that is the case.)

  • Internet browser such as Firefox, Opera or Internet Explorer.


  • Internet Account with your chosen free internet service provider


  • Dial-up connection


For this tutorial, my experience is based on using WindowsXP and the free ISP provider http://www.freedialup.org

Considering all the different windows installation possibilities, what you see on your screen may vary somewhat from mine or if you are using a different version of windows you will look for similar to my instructions below. Ultimately you will be using the "New Connection Wizard".


The object of this tutorial is to show you the steps for creating a manual dial-up connection.

1. - Click "start". Find and hover your mouse over "Connect To". From the dropdown list, click on "Show All Connections". **If you don't see the "connect to" icon in your start menu, see below for directions to activate it.
 
2. -In the new window, open up/double click on "New Connection Wizard"

3. - Click the "next" button

4. - Tick the bullet for "Connect To The Internet". Click "next".

5. - Tick the bullet for "Set up my connection manually". Click "next".




6. - Tick the bullet for "Connect using a dial-up modem". Click "next".



7. - Type in the name of your ISP. This will give your icon a recognizable name. Click "next".

8. - Type in the connection phone number you chose when you signed up for your account. Click "next".

9. - This is where you will enter the account name and password that you wrote down after signing up for an account with your free ISP. Click "next".

10. - You can tick off the box to "add a shortcut to this connection to my desktop" so you can easily find it. Click "finish".


11. - After clicking "finish" you will see this box. Click "dial" to connect to the internet.


12. - If all went well ...... Once you are connected to the internet you should see two little blinking green computer icons to the right side in your taskbar. Two blinking green means there's an established connection. Red in the icon means there is no connection.

13. - Now open your browser to surf the internet.



---------------------------------------------------------------------------------------------
**If you don't see the "connect to" icon in your start menu, here's how to activate it.

1. - Right click your task bar.

2. - Make sure the 'start menu' tab is selected. Click the 'customize' button.
3. - Select the 'advanced' tab. Scroll down to find 'network connections'. Tick the bullet for 'display as connect to menu', click ok.
click apply and click ok again.
Go back to your start menu and you should now see the "connect to" icon. ---------------------------------------------------------------------------------------------

** another way to get to the "New Connection Wizard" is if you use Internet Explorer for your browser...open up IE. Click on, tools > internet options, click on the "connection" tab. Click on the "setup" button. This will open up "New Connection Wizard".

 

Saturday, 26 July 2014

10 Speed Hacks That'll Make Google Chrome Blazing Fast on Your Computer

If browsing speed is important to you—and it should be—you'll probably be interested to know that there are ten simple flag modifications you can make in Google Chrome in order to achieve the fastest browsing speed possible.
A few months ago, Dallas covered six ways to speed up the Chrome mobile browser on a Nexus 5, and if they're good enough for his Android phone, they're good enough for our desktops. Below, I'll show you how to enable them, along with a few other speed-increasing tips.

Step 1: Access Chrome's "Secret" Settings

Chrome allows you to use unofficial browser features called "flags" while they are being tested or are generally unstable. These features are strictly experimental and may break or disappear at any time. In other words, take advantage of them while you can.
To access these secret settings, simply enter chrome://flags into your address bar, aka the omnibox, which we've hacked a couple times over the last week to make a tab-based text editor and speed up our Gmailing. Hit the Enter key, and you will be brought to the flags page and shown a short warning.
 
It's okay. These features can all be disabled later if you notice any glitches.

Step 2: To Make Things Simple, Open "Find…"

These flags aren't very organized, so to save you from scrolling up and down all day, hit Cmd+F (Mac) or Ctrl+F (Windows), or click the three-line overflow menu button in the upper-right and select "Find…".

Step 3: Pick & Choose Your Chrome Speed Hacks

Now, below are ten different settings you can mess with in Google Chrome, but you don't need to enable all of them. Pick and choose the ones you want, and find the combination that works best with your workflow. Some things may not apply to your particular browsing game.

Speed Tip #1: Set "Maximum Tiles" to 512

The first feature we're going to change is the number of "maximum tiles for interest area." Basically, this feature will increase the RAM that Chrome is allowed to use, and should take any little glitch out of your browsing experience.
In the search bar that you just opened in Step 2, type Maximum Tiles and hit Enter. Once you're brought to the Maximum Tiles row, click the drop-down menu and change Default to 512.

Speed Tip #2: Change the Number of Raster Threads to 4

Tired of slow loading image? This modification will change the rendering speed of images in Chrome. Search for Number of Raster, and change the number of raster threads to 4.

Speed Tip #3: Enable SPDY/4

This modification will speed up page loading by making web transactions quicker. Search for Enable SPDY, then click the little blue Enable link in the Enable SPDY row; its color should change from light grey to white and the blue link should now say "Disable."

Speed Tip #4: Enable Offline Cache Mode

For moments where internet connectivity is briefly interrupted, you can allow Chrome to load cached versions of webpages. Search for Enable Chrome and click the Enable link in the Offline Cache Mode row.

Speed Tip #5: Enable Experimental Canvas Features

This modification allows Chrome to utilize opaque canvases to increase loading times and boost performance. Search for Enable Experimental Canvas and click Enable in the Experimental Canvas row.

Tuesday, 22 April 2014

HOW TO CHECK YOUR FRIEND'S BALANCE

HERE IS  USEFUL TRICK FOR TATA DOCOMO,
NOW YOU CAN CHECK BALANCE OF YOUR FRIEND WHO HAVE DOCOMO SIM,
JUST FOLLOW THESE STEPS TO MAKE THIS TRICK WORKING-

STEP I -
Dial  07737012345



STEP II -
Choose you language [e.g. Press 2 for English]

STEP III -
Now press 1 if you are a Docomo Customer.

STEP IV -
ENTER docomo number of your friend

STEP V -
Press 1 to confirm.

STEP VI -
Now again press 1 to CHECK HIS BALANCE, if customer care says “TO KNOW YOUR BALANCE JUST TYPE “BAL” AND SEND IT TO 121″, then no problem dissconnect the call and repeat the procedure again. . .





[Note -Please do not copy the content just share it with your friends on FACEBOOK, TWITTER, GOOGLE+,GMAIL]

FREE CALL FOR DOCOMO USERS

STEP 1:

    Download  TATA DOCOMO GET app on your smartphone.





STEP  2:

    Now just install the app and verify your number, please note that if you are using dual SIM phone then primary number should be DOCOMO  number.




STEP 3:

    Now whenever you want to call your friend , just open the app and tap on FREE CALL




STEP 4:

    Now you just have to watch 15-20 seconds ad on your phone to get free calling minute. That’s it.






NOTE:

        You can get only 3 minutes daily for free call. [1 minute free call on one ad.]
        Need internet connection to watch ad.
        Normal call rate will be applied after free calling minutes.

HOW TO CREATE LOCKED FOLDER

1. Make a folder on the desktop and name it as “folder”.

2. Now, open notepad and write ren folder folder.{ED7BA470-8E54-465E-825C-99712043E01C} and now (Notepad Menu) File>save as.

3. In the ‘save as’ name it as lock.bat and click save ! (Save it on Desktop)

4.Now, again open notepad again and write ren folder. {ED7BA470-8E54-465E-825C-99712043E01C} folder and now (Notepad Menu) File>save as.

5. In the ‘save as’ name it as key.bat and click save ! (Save it on Desktop)

6. Now, double click lock.bat to lock the folder and now if you open your folder, control panel will open up !

7. Now, double click key.bat to open the folder and now if you open your folder, you can access your data inside the folder again !

8. Lock your folder and hide the key.bat somewhere else on your hard disk !

9. Whenever you want to open your folder just paste the key.bat on desktop and open your folder using it.

A NEW TRICK FOR CHECKING THE SAVE PASSWORDS IN GOOGLE CHROME

hi ,friends