Friday, 25 March 2011

list of the secret codes of the android

 List of the Secret codes of Android :

Secret Codes of Android Mobile phone it helpful to any person who dont know about the codes in the your regular using smartphone that are powered by the Android google trademarks.

There are the some secret codes :

android secret code
Nokia Mobile Codes

1) *#06# For checking IMEI(international Mobile Equipment Identity)
2) *#7780# Reset to factory settings
3) *#0000# To view software version
4) *#2820# Bluetooth device address
5) *#746
Shows if ur sim 025625# Sim clock allowed status
6) #pw+1234567890+1#as any restrictions

7) *#732874826337378# Reset Security Code . 

Samsung Mobile Codes
1) *#9999# or *#0837# for software version 
2)*#6# For IMEI 
3)*#9998*246 for battery status and memory status 
4)*#9125 for smiley
5)*#89998778# for Display simcard information .
6)8#2222# for hardware version .

Samsung Android Codes
1) *#*#4636#*#*- Display information about the phone , battery and usage statistics
2)*#*#7780#*#*-Reset your Factory to Default
3)*2767*3855#-Reinstall the phone firmwares
4)*#*#34971539#*#*-Show Complete information about the camera
5)*#*#7594#*#*-Changing the power button behaviour
6)*#*#273283*255*663282*#*#*-for a quick backup to all your media files
7) *#*#197328640#*#*-Enabling the test mode of service activity
8)*#*#232339#*#*- Wireless lan test
9)*#*#232338#*#*-Display Wi-fi Mac address
10)*#*#1472365#*#*-For a quick gps test
11)*#*#0283#*#*-Packet look up test
12) *#*#0673#*#* OR *#*#0289#*#*- Audio Test
13)*#*#0842#*#*-Vibration test
14) *#*#2663#*#*-Display touch screen version test
15) *#*#2664#*#*- Touch Screen test
16)*#*#0588#*#*-Proximity Sensor test
17) *#*#3264#*#*-Ram version of system
18) *#*#8255#*#*-Google Talk service monitoring
19)*#*#8351#*#*-Enable voice logging mode
20) *#*#8350#*#*-Disable voice logging mode

These are simple list of the secret codes hidden in the android operating system . try it . 

how to protect microsoft word document with password

How to Protect Microsoft Word Document With Password 

Protect the Microsoft word document form the unauthorized person with the password . Anyone cannot able to read or modify your document without your permissions . Every unauthorized person need password to open the document . if person applied correct password on the document then your document will open to modify or changes . if password entered UN-correct then your document should be protected from the unauthorized use . Without password your document becomes read only functionality .

How to Set your Password on the Microsoft Word it is simple to set the password in Microsoft word document . Follow the Simple Steps for make your document password protected .

Step 1 : Open the word document that you wanted to protect from unauthorized used.

Step 2 : Go to Prepare and Click on the Encrypt Document and Set the password .

Encrypt Document Dialog box and Password Box , Type the Password Hard that you remember easily . In Microsoft Word You can make password up to 255 characters or by default you uses AES 128-bit advanced Encryption . Encryption is the standard method used to make your file more secure .

 Step 3 : Confirm the Password and Re- Enter the Password to protect your document .

password protected

Password Protected

Step 4 : To Delete a Given Password Go to Microsoft Word and click on the encrypt document under prepare menu . Click on the encrypted password and delete .

Step 5 : if you want to modify your old password Go to General Option and under file sharing modify the password . Enter the password and re-enter the password to make your document save .

These are very easy step to protect your microsoft word document with the password .

Tuesday, 22 March 2011

Names of the commands that are used in command prompt

Name of the Command That are Used in Command Prompt

This is a list of command prompt  command list
command promt
Command Prompt

If you want to know commands used in Command Prompt, just type "help" and you will get the following commands with their description.

ASSOC                Displays or modifies file extension associations.
AT Schedules     Commands and programs to run on a computer.
ATTRIB               Displays or changes file attributes.
BREAK                Sets or clears extended CTRL+C checking.
CACLS                Displays or modifies access control lists (ACLs) of files.
CALL                  Calls one batch program from another.
CD                      Displays the name of or changes the current directory.
CHCP                  Displays or sets the active code page number.
CHDIR                 Displays the name of or changes the current directory.
CHKDSK              Checks a disk and displays a status report.
CHKNTFS            Displays or modifies the checking of disk at boot time.
CLS                     Clears the screen.
CMD                    Starts a new instance of the Windows command interpreter.
COLOR                Sets the default console foreground and background colors.
COMP                 Compares the contents of two files or sets of files.
COMPACT           Displays or alters the compression of files on NTFS partitio
CONVERT           Converts FAT volumes to NTFS. You cannot convert the
                         current drive.
COPY                Copies one or more files to another location.
DATE                 Displays or sets the date.
DEL                   Deletes one or more files.
DIR                   Displays a list of files and subdirectories in a directory.
DISKCOMP        Compares the contents of two floppy disks.
DISKCOPY        Copies the contents of one floppy disk to another.
DOSKEY           Edits command lines, recalls Windows commands, and creates m
ECHO               Displays messages, or turns command echoing on or off.
ENDLOCAL        Ends localization of environment changes in a batch file.
ERASE               Deletes one or more files.
EXIT                 Quits the CMD.EXE program (command interpreter).
FC                   Compares two files or sets of files, and displays the differ
                        between them.
FIND                Searches for a text string in a file or files.
FINDSTR           Searches for strings in files.
FOR                  Runs a specified command for each file in a set of files.
FORMAT           Formats a disk for use with Windows.
FTYPE              Displays or modifies file types used in file extension assoc
GOTO               Directs the Windows command interpreter to a labeled line in
                       batch program.
GRAFTABL       Enables Windows to display an extended character set in grap
HELP              Provides Help information for Windows commands.
IF                   Performs conditional processing in batch programs.
LABEL            Creates, changes, or deletes the volume label of a disk.
MD                 Creates a directory.
MKDIR            Creates a directory.
MODE             Configures a system device.
MORE              Displays output one screen at a time.
MOVE              Moves one or more files from one directory to another direct
PATH              Displays or sets a search path for executable files.
PAUSE             Suspends processing of a batch file and displays a message.
POPD              Restores the previous value of the current directory saved b
PRINT             Prints a text file.
PROMPT          Changes the Windows command prompt.
PUSHD            Saves the current directory then changes it.
RD                  Removes a directory.
RECOVER        Recovers readable information from a bad or defective disk.
REM                Records comments (remarks) in batch files or CONFIG.SYS.
REN                Renames a file or files.
RENAME          Renames a file or files.
REPLACE          Replaces files.
RMDIR            Removes a directory.
SET                Displays, sets, or removes Windows environment variables.
SETLOCAL      Begins localization of environment changes in a batch file.
SHIFT            Shifts the position of replaceable parameters in batch files
SORT             Sorts input.
START           Starts a separate window to run a specified program or comma
SUBST           Associates a path with a drive letter.
TIME              Displays or sets the system time.
TITLE             Sets the window title for a CMD.EXE session.
TREE              Graphically displays the directory structure of a drive or p
TYPE              Displays the contents of a text file.
VER                 Displays the Windows version.
VERIFY            Tells Windows whether to verify that your files are written
                     correctly to a disk.
VOL                 Displays a disk volume label and serial number.
XCOPY            Copies files and directory trees.

How make computer speak what you write on it

 How make computer speak what you write on it

 Here is a one simple to computer speak what you write on the computer using this simple trick you are able to listen the file what you write on it . it really simple and awesome trick . By follow the step your trick is ready to use .

Follow these steps for the trick usable

Step 1. Open a note pad and write the command    createobject("SAPI.spvoice").speak " write there what ever u want that your computer speaks "
Step 2. Then save the note pad with any name with extension ".vbs" as shown

Step 3. Then note pad file will appear like this..
Step 4.After that right click on that folder than press open it will what ever u write in the inverted comma  ......

hope u like it...

Sunday, 20 March 2011

How to Create a Invisible Folder .

How to create a invisible folder in windows pc 

How to create a invisible folder on the windows to hide your personal information from the someone . it is awesome trick that help you to hide your personal data from the friends and family members to make your your folder private from the use of some one without your permission . its very simple this time follow my steps to hide your personal information . By follow my simple step of direction for how to safe your personal information from the some guest . After follow all the step you are able to hide and invisible your private information . By making Simple instruction you will able to make your folder invisible without name .

Step : 1 Right Click and Select New Folder to create new folder in pc in which place you needed .

Step : 2 Now Rename the Folder Using Press and Hold ALT and write 0160 after clicking rename that will make your File Name to No Name(without name).

Step : 3 AFter second step your File have no name .

Step : 4 Then Right Click on the Folder then go to the properties and customise click and change icon and click on the Blank icon  .

Step : 5 After that your file have invisible without name . make it hidden by selecting hidden on properties .

Step : 6 if you want back file than show hidden folder and select the invisible folder icon change again and rename the file .

Enjoy the Trick.


Comment and Share .

Saturday, 19 March 2011

list of the top search engine in the world

List of the Top Search Engine in the World :

Search Engine are online huge database of the collection of webpages and domain list . Show specific result to the user from the database it helps to get business from the search engine . Search Engine is very Helpful to find the billions of online identity from all over the world .  Search Engine find and returns the relevant website , images and real time results from the web .  Search engine use spider and crawler to index the web page to their database engine it index the web pages keywords , descriptions , links from the single web pages . Many Search engine can rank the website according to their traffic.

A Web page rank depend on the following few factors :
1.The frequency and location of keyword within the webpages . 
2.How long page are existed on the web .
3.The number of web page link to the page . We call backlinks that give links back to our page .

These are the top search engine over the world :

1.       Baidu:
2.       Bing:
3.       Duck duck go :
4.       Exalead
5.       Gigablast
6.       Google
7.       Munax
8.       Qwant
9.       Sogou:
10. :
11.   Yahoo:
12.   Yandex:
13.   Youdao:
14.   Faroo:
15.   Seeks :
16.   Yacy:
17.   Blingo:
18.   Yippy
19.   Deeperweb:
20.   Dogpile :
21.   Excite :
22.   wow :
23.   Hotbot :
25.   Ixquick
26.   Mamma
27.   Metacrawler
28.   Webcrawler
29.   Accona
30.   Ansearch
31.   Biglobe
32.   Daum
33.   Egerin
34.   Goo
37.   Naver
38.   Rambler
39.   Rediff
41.   Sesam
42.   Seznam
43.   Walla
44.   Sophia search
45.   Swoogle
46.   Cuil
47.   All the web
48.   Lycos
49.   Aol search
50.   Exalead
51.   Zoo
52.   Ask
53.   Jayde
54.   Entireweb
56.   Startpage
57.   Visvo
58.   Anoox
59.   Web squash
60.   Scrub the web
61.   Fyber search
62.   Exactseek
63.   Jayde
64.   Mixcat
65.   Ghetto search
66.   Feedplex
67.   Searchsight
68.   Amidalla
69.   Spiffysearch
70.   Ecosia
71.   Alexa
72.   Wow
73.  fybersearch
74.  afghana-
75.  buscopio-
76.  arabo
78. unabot
79. egyptsearch
80. domotom
81. 123india
82. 123khoj
83. zatka
84. Zapmeta
85. my india
86. geres
87. bangladesh search
88. locate india
89. viesearch

This is the list of world top search engine . if you know some other add on comment .

how to protect usb drive from vrus when attached to infected computer.

How to Protect Usb from Virus attack if Attached to the infected Computer

We use Pen drive to transfer the data from one pc to another in our regular days of work . Sometime we attached over usb drive to some infected desktop pc that are harmful for the data transfers . Because of the Virus come from the infected system we are unable to find our useful files from the usb drive . Usb drive get virus infected very fast we need to protect them from the virus  and other malware programs .Flash drives are so popular and most widely used to move data between computers, they are the prime target for attackers as a means to get infections spread around the computer world. Also, since USB drive is not a Read-Only Memory (ROM), the data inside it can easily be modified or deleted by malware programs.
Pen drive


But unfortunately, most of the new flash drives do not come with a write-protect feature as the manufacturers wish to cut down the cost of production. Hence, the only way to write-protect your USB flash drives is to enable this feature on your own computer.
This can be done by adding a small entry to the Windows registry which acts as a switch that can be enabled to make use of the write protection or disabled to allow write access. Just follow these steps:

1. Open the Registry Editor (Open the “Run” dialog box, type regedit and hit “Enter”).
2. Navigate to the following Registry key:
 3. Create a New Key named as StorageDevicePolicies. To do this right-click on Control, and click on New->Key and name it as StorageDevicePolicies.
4. Now right-click on  StorageDevicePolicies and create a New->DWORD (32-bit) Value and name it as WriteProtect.

5. Double-click on WriteProtect and set the Value data to 1.
Now the right-protection for USB drives is enabled on your computer (no restart required) and thus it would not be possible for anyone or any program to add/delete the contents from your USB flash drive. Any attempt to copy or download the files onto the USB drive will result in the following error message being displayed.

To revert and remove the write-protection, all you need to do is just change the Value data for WriteProtect (Step-5) from 1 back to 0. Now write access to all the USB devices is re-enabled.