Sunday, December 13, 2009

How To Send Ringtone to Your Cell Phone Through Email

Most cell phones allow you to add a new ringtone by sending a binary ringtone code over the Internet, either by email or through an SMS gateway. Here's how to send your own songs quickly to your phone instead of wasting money on buying ringtones. It's easy and will only take about five minutes.

Steps:
  1. Before attempting this make sure that your cell phone is able to receive ringtones in this way.
  2. Simply attach the ringtone file that you downloaded to an e-mail and send it to your cell phone or if you create your own mp3 file to use as a ringtone make sure the file size is under 200k otherwise it can't be used as a ringtone but will be saved as a sound file. If you do not know your cellphone's e-mail address you will be able to find it from the list below.
  3. Once your cell phone has received your ringtone review your manual to see how to apply it as a ringtone with your specific make and model phone.
  4. E-MAIL ADDRESSES FOR YOUR CELL PHONE SERVICE PROVIDER:
    • Alltel Wireless : your phone number without spaces or dashes (including area code)@message.Alltel.com (Example: 9055556543@message.Alltel.com)
    • AT&T Wireless (now part of Cingular) : your phone number without spaces or dashes (including area code)@mms.att.net (Example: 9055556543@txt.att.net)
    • Cingular: your phone number without spaces or dashes (including area code)@mobile.mycingular.com OR your phone number without spaces or dashes (including area code)@cingularme.com (Example: 4152221212@mobile.mycingular.com or 4152221212@cingularme.com)
    • Nextel: your phone number without spaces or dashes (including area code)@messaging.nextel.com (Example: 7035551234@messaging.nextel.com)
    • solo phones: your phone number with out spaces or dashes(with area code)@txt.bell.com (ex.9487261234@txt.bell.com
    • Sprint PCS: your phone number without spaces or dashes (including area code)@messaging.sprintpcs.com (Example: 8155551234@messaging.sprintpcs.com)
    • T-Mobile: your phone number without spaces or dashes (including area code)@tmomail.net (Example: 4251234567@tmomail.net)
    • Verizon: your phone number without spaces or dashes (including area code)@vzwpix.com (Example: 5552223333@vzwpix.com)

    source : www.wikihow.com

How To Create a Webcast

Ever seen a webcast like iCarly or The Miley and Mandy Show? Look fun to you? Here's how to make your own webcast!

Steps:

  1. Think of a good name for your webcast. Be creative.
  2. Pick a couple of friends. Or just one.
  3. Decide what days you and your friend(s) can record.
  4. Where are you going to shoot webcast? Outside, your room, a garage, whatever.
  5. What will you say and do on your webcast? Write a script. Or just think of a topic to talk about. Never just talk off the top of your head.
  6. How often do you do your webcast. Once a day, once a week, even once a month.
  7. Where will you post your webcast? Youtube, Your own website, do what you want.
  8. Spread the word! Pass out flyers, emails talk on the phone, you know what to do!
  9. Have Fun!
source: www.wikihow.com

How To Close Old Email Accounts

You may have decided that you no longer want to have email accounts spread over different websites or companies. Your ISP may be providing email accounts for you, or you may have taken the plunge and finally gone and got that domain name for your mail address. What ever the reason, you may want to close your older accounts on Google Gmail and Yahoo Mail. Here I present to you how to do just that in a few simple steps.

Yahoo! Mail
  1. Yahoo first, I recomend that you visit the How do I close my account? help page on Yahoo. It may have some important information that you may not be aware of.
  2. After you've read the above link and you're sure that you want to delete your Yahoo account go to Yahoo's Delete Userpage and fill your password and click terminate this account button.
Gmail
  1. Gmail next, The deletion of your Gmail account. Again, please read the Google Help page for more information regarding anything you should be made aware of as per the deletion of your account.
  2. Sign in to the Delete Account page on your Google Accounts homepage.
  3. Check the boxes for the services you want to delete, enter your password and click the delete button.
source: www.wikihow.com

How To Cancel Paypal Subscription

Many websites and other businesses give their customers the ability to subcribe to a magazine or other recurring service using the subscription option at PayPal. Every month, or at the end of each specified time period, PayPal automatically generates payment from your account in order to pay for the subscription. In some cases, the account may be through another company, but because payment automatically comes from PayPal, it can be confusing when you want to cancel a PayPal subscription. This article will provide you with some practical steps you can take to stop the automatic payment.

Steps:

 Cancel Your Subscription from the PayPal Website


  1. Log in to your PayPal account.
  2. Click history under "My Account"
    Click history under "My Account"
    Click "History" under "My Account" at the top of the page.
  3. Start a search and change the dates so you start the search from the date before you started your subscription.
  4. Use the filter drop down to select "subscriptions".
  5. Click "Details".
  6. Middle button at bottom of page
    Middle button at bottom of page
    Click "Cancel Subscription". This button appears at the bottom of the page.
  7. Confirm the choice by clicking "Cancel Subscription" again.

Go to the Vendor's Website to Cancel Your Subscription

  1.  Determine whether you can cancel your PayPal subscription through the vendor offering the service or product. Cancellation policies vary by website, so you may need to visit the website in order to find out this information. 
  2. Follow the directions provided by the company in order to cancel the subscription. In some cases, a customer service representative may be able to cancel it for you over the phone.
Tips:
  • You can change the payment options on your subscription at the PayPal website, if you just want to have payment come out of a different account. Look for the "Pay List" in the "Financial Information" section of your PayPal profile, find the name of the merchant and look for the option to change the "Funding Source."
  • There may be a slight variation in the location or wording for some of the steps. If you need help, contact PayPal customer service.
source: www.wikihow.com

How to Add click to Talk Technology To Your Web Page, Blog, or Email Signature

By following the steps below, you will be able to add a button to your website, blog, or email signature that when clicked, will establish a phone connection between the clicker and you. This technology will increase on line revenue by making it easy for your customers to contact you and allows your friends and family to call you for free.

Steps:
  1. Go to www.jaduka.com and click the link for a free trial Click-and-Connect account.
  2. Sign up: All you have to provide is your name, email address, password, and a phone number.
  3. To add a button to your website or blog, go to the Website Call Button page from the control panel and download the HTML code. All you have to do is place the code where you want it to appear on your site.
  4. To add a button to your email signature, go to the Email Call Button page from the control panel and download your email signature code and then follow the instructions received in the email.
  5. That's it! You have now upgraded your website, blog and email by increasing the methods of communication your visitors can use to contact you.
Tips:
  • Change the way your button appears by configuring it within the Website Call Button and Email Call Button pages. You can change the image that viewers see as well as the information displayed within your signature.
  • How does it work? When someone clicks on your button, regardless of where you place it, a window pops up where they can enter their phone number. They hit connect and their phone rings, then your phone rings and the two calls are connected. Calls are connected over the PSTN (Public Switched Telephone Network), not VOIP.
source: www.wikihow.com

Saturday, December 12, 2009

Free Download PortTunnel 2.0.23.401

A fully customizable and user-friendly port redirector.


PortTunnel is designed as a TCP/IP port redirector with many features for the advanced user.
Here are some key features of "PortTunnel":


· Includes IP security (and stealth ports on 2000/XP)
· Can tunnel most TCP connections out through most proxies
· Can translate FTP 'PORT' and 'PASV' commands (FTP Bouncing)
· SSL/TLS support (using OpenSSL 0.9.7)
· sFTP (FTP over SSL/TLS)
· SMTP relay filtering
· Runs as a service on ALL versions of Windows
· Can log all data
· Great for debugging network programs
· Can redirect many ports at once (including port ranges)




Limitations:
· Nag screen at program startup
· 20 simultaneous connections
· SMTP filtering disabled
· SSL/TLS disabled


Click here for download


Friday, December 11, 2009

The Google Search Appliance Gets Twitter Results



Real-time search is the hot topic right now, especially since Google has rolled out a full-blown service inside the main search engine. Bing has been doing it for more than a month now, Yahoo has just revealed it will integrate tweets as well, and now real-time search is moving to enterprise search as Google has announced that it will serve results from Twitter with its Google search appliance for businesses.
“Real-time information is becoming an increasingly important part of searching online – both for business and consumer search users. Yesterday we announced the launch of real-time results on Google.com, and today we're announcing that the Google Search Appliance (GSA) can show users tweets from Twitter next to their internal Search Appliance results,” Cyrus Mistry, product manager, Google Enterprise Search wrote.

The announcement is clearly related to the real-time features Google introduced to the search engine, but there are some notable differences between the two products. Whereas real-time results are thrown in among the regular ones, on the main search engine, they are relegated to a section on the right of the page on searches with the GSA.

This separation is important and it makes sense that Google chose this path. When doing a regular search online, you expect to get the most relevant results, regardless of their origin. With the GSA though, you expect to get results from internal company sources, it is an intranet search service after all, so the main search results come exclusively from inside the company.

But web results can sometimes be important even when using the internal search engine, so Google also serves results from the main search engine on the right hand site of the interface, where the ads would normally sit. Now, admins can configure the GSA to show results from Twitter, and only Twitter not any other real-time source, above the normal web results.

“Customers have told us that placing web results next to intranet ones often allows employees to think differently about a particular topic and approach it in new ways. By integrating enterprise search with more of the information that exists in the cloud, like tweets, employees can more easily leverage the wisdom of the crowd,” he added.

 source: www.softpedia.com


Free Download Spamihilator 0.9.9.44




Spamihilator works between your E-Mail client and the Internet and examines every incoming E-Mail. Useless spam mails (Junk) will be filtered out. This process runs completely in the background.
The Learning Filter (Bayesian Filter) uses the rules of Thomas Bayes (English mathematician, 18th century) and calculates a certain Spam-Probability for every E-Mail. You can train this filter! So it will know your messages even better than you. Hence the recognition rate will continuously increase.
The program works with almost every E-Mail client, such as Outlook 2000/XP/2003/Express, Eudora, Mozilla Thunderbird, IncrediMail, Pegasus Mail, Phoenix Mail, Opera, etc... It supports POP and IMAP accounts, as well as secure connections.
Spam Recognition Filters:
  • The Learning Filter recognizes more than 98% of all incoming spam mails. Use the Training Area, to increase the recognition rate continuously.
  • You can also specify certain words, that often appear in spam mails. The Spam-Word-Filter will look for these words.
  • The Link Filter searches incoming messages for links to spam websites.
  • The DCC-Filter connects with the DCC Network to recognize unsolicited bulk mail.
Click here for download




Thursday, December 10, 2009

Google Chrome's Brilliant, New Video Ad


Now that Google Chrome is becoming a viable option for most users with the launch of the beta version for both mac and linux and the new Extension Galleery which is quickly picking up momentum, the company is apparently more determined than ever to promote it to the public at large. And what better way to do that than with an ad, after all Google is pretty much an advertising company, despite what it may look like.

Google has certainly proven that it knows advertising, it makes the bulk of its less than modest revenue from ad sales, but it's mostly stayed at the “receiving end” of the market. The few times that it has ventured out and actively promoted one of its products it has proven that it can do the other side of the business just as well, like with the Going Google campaign that is still running online. 

The latest proof of the company's advertising genius is a series of new Google Chrome ads, which show off the browser's main advantages. What's great about the ads is the way Google chose to present the features, by using a somewhat low-tech and definitely analogue approach. The ads go through Chrome's main selling points by using some very interesting animations, all done with real-world contraptions, though a little bit of digital trickery is likely to have made its way in the finished product. 

The ads are now available on Google Chrome's UK You Tube Channel, where else, stitched together into a four-minute-long video. The video has been recently uploaded and Google hasn't made any official announcement just yet, but it is already picking up steam and will likely go viral in a very short time, judging from the buzz it is generating, all measurable with the new Google real-time search features. There's no point talking about it too much, you really have to see it to believe it.

source: www.softpedia.com


Wednesday, December 9, 2009

Free Download mIRC 6.35



mIRC is a full featured Internet Relay Chat client for Windows that can be used to communicate, share, play or work with others on IRC networks around the world, either in multi-user group conferences or in one-to-one private discussions.
It has a clean, practical interface that is highly configurable and supports features such as buddy lists, file transfers, multi-server connections, SSL encryption, proxy support, UTF-8 display, customizable sounds, spoken messages, tray notifications, message logging, and more.
mIRC also has a powerful scripting language that can be used both to automate mIRC and to create applications that perform a wide range of functions from network communications to playing games.
mIRC has been in development for over a decade and is constantly being improved and updated with new technologies.

Click here for download 


How to Fight Spam

The more you clean up your email, the faster it grows. Receiving Spam email is not only annoying, bothersome, and sometimes expensive, it could also cause you to completely have everything on your computer deleted. Spam is difficult to control, even if you block the sender. They just use a different email address. There is another method to try, that with patience will get these spammers stopped.

Steps:

Finding the Headers

  1. Open up a spam email. Make sure you are using an email service such as GMail that will not run HTML or pictures.
  2. View the full headers of the email.

SpamCop Method 1

  1. Find the place where it says "Received-SPF: (google.com: best guess record for domain of designates as ) in the headers (for GMail).
  2. Take and go to SpamCop.
  3. Sign up for SpamCop.
  4. Paste it into the box and click Process Spam. This will give you an abuse email address (or more than one).
  5. Email the address(es) and complain. Make sure to include the full headers (all the text you see after pressing "Show Original")!

SpamCop Method 2

  1. Select all the text of the full headers with CTRL+A.
  2. Press CTRL+C to copy the headers.
  3. Go to SpamCop and sign up.
  4. Paste the full headers into the box and press "Process Spam", or just send the headers to the email address given to you above the box. If you send it, wait for an email (unless you are using Quick Reporting) and click on the link in it.
  5. Scroll down and click "Send Reports".

KnujOn

  1. Forward the email to nonregistered@coldrain.net, an anonymous email of KnujOn. You can also register for a limited account for free.

Complainterator:
  1. Find the spammed URL in the message.
  2. Visit the website (in Firefox with anti-malware protection running) to make sure that it is still active.
  3. Download the latest version of Complainterator.
  4. Post the link into Complainterator, choose your speed and mail provider, and click OK.
  5. Wait for Complainterator to generate a message.
  6. Add any extra information to the message under evidence, such as a SpamTrackers entry, a SiteAdvisor link, a Spamhaus SBL Advisory, and/or the full source of the message you received, in the email or in a text file hosted on the internet.
source: www.wikihow.com



Tuesday, December 8, 2009

Firefox 3.7 vs. Internet Explorer (IE9 ) – Windows 7 DirectX 11 Hardware Acceleration


The race between Mozilla and Microsoft is on yet again to establish positions such as innovation leader and follower, when it comes down to Firefox and Internet Explorer. And it will most probably fall on the two company’s next generation browser releases to help label the two software makers as either leading the wave in innovation or bringing to the market features that are already sported by the rival product. In this regard, Firefox 3.7 and Internet Explorer 9 are currently neck-in-neck at the start line toward the adoption and implementation of hardware acceleration.

Last week, at the Professional Developer Conference 2009 in Los Angeles, Steven Sinofsky, president, Windows and Windows Live Division, demonstrated a very early, just three weeks old copy of Internet Explorer 9, touting hardware acceleration as one of the major enhancements coming to IE users. In the video embedded at the bottom of this article, you will be able to get an insight into IE9 hardware acceleration possible because of Windows 7’s DirectX 11 graphics technology.  

“We’re changing IE to use the DirectX family of Windows APIs to enable many advances for web developers. The starting pointis moving all graphics and text rendering from the CPU to the graphics

card using Direct2D and DirectWrite. Graphics hardware acceleration means that rich, graphically intensive sites can render faster while using less CPU. Now, web developers can take advantage of the hardware ecosystem’s advances in graphics while they continue to author sites with the same interoperable standards patterns they’re used to,” explained Dean Hachamovitch, general manager, Internet Explorer.

However, Microsoft is matched by mail competitor on the browser market, Mozilla, in regards to kicking the browser up a notch by better leveraging underlining hardware resource. Mozilla is, unlike Microsoft, offering an early, preview build of Firefox 3.7 which already makes use of Direct2D and DirectWrite.

“Although the investigation and implementation are still in an early stage, we can conclude that things are looking very promising for Direct2D. Though older PCs with pre-D3D10 graphics cards and WDDM 1.0 drivers will not show significant improvements, going into the future most PCs will support DirectX 10+. PCs in the future could allow providing extremely smooth graphical experiences for web-content like SVG or transformed CSS. Interestingly, Microsoft has also announced IE9 will feature Direct2D support as well only shortly ago. Feel free to download and try a build of Firefoxhere,” said Mozilla’s Bas Schouten. (via DeepTech)

This is not valid for Internet Explorer 9. Despite dogfooding and demoing IE9, Microsoft did not serve any bits to users outside of Redmond. In addition, Microsoft did not even provide a clue as to when it plans to make the first build of IE9 available for early adopters. Mozilla’s open source development model wins yet again in this respect.

“First of all why is GPU acceleration important? Well, in modern day computers, it's pretty common to have a relatively powerful GPU. Since the GPU can specialize in very specific operations (namely vertex transformations and pixel operations), it is much faster than the CPU for those specific operations. Where the fastest desktop CPUs clock in the hundreds of GFLOPS(billion floating point operations per second), the fastest GPUs clock in the TFLOPS(trillion floating point operations per second). Currently the GPU is mainly used in video games, and its usage in desktop rendering is limited. Direct2D signifies an important step towards a future where more and more desktop software will use the GPU where available to provide better quality and better performance rendering,” Schouten explained.
with Direct2D support

source : www.softpedia.com



Monday, December 7, 2009

How to be Safe on Social Networking Sites

Would you tell a complete stranger all about your family, work, love life, hobbies and interests? And give them some personal photos to look at too? Most people approached on the street would probably answer ‘no’ to the above questions. But on the Internet, that’s exactly what millions of us are doing on the hugely popular social networking sites and chat rooms. Online social networks are fun and hip, but they also present a major security concern for Internet users.
Today your online wellbeing has a direct impact on the rest of your life. So enjoy the social networking sites while also keeping security in mind. That way you are protecting your computer, money and reputation, as well as your family and friends.

Steps:
  1. Don’t reveal too much: Each web site provides different levels of privacy settings to control access to your profile page and your interaction with others. Identity theft is a major industry on the Internet and information extracted from social networking sites is used by criminals to spam e-mails and for targeted attacks on specific individuals and companies, using sophisticated social engineering techniques.
  2. Beware of spam messages: It could be an e-mail pretending to be from someone you know, addressing you by your first name and mentioning the names of your children. It doesn’t look like a spam message and it can trick you into revealing even more sensitive information. Similar methods are also used to gain financial information from businesses.
  3. Educate yourself: As social networking sites and chat rooms are especially attractive to children and teenagers, it is essential that parents educate them about safe online behavior and keep tabs on what they are doing online.
  4. Maintain a good reputation: It’s worth remembering that whatever you post on your profile page, or other community forum, remains in the public sphere long after you log out of the web site. This includes the crazy stuff and wild photos that you posted on Facebook but decided to delete ten minutes later because it suddenly seemed like a bad idea. The problem is that you can’t really retract it. Once it’s out there on the Web, you have little control over who copies the material, where it is used and how widely it gets distributed.
Tips:
  • Bebo provides an excellent summary of the security issues involving social networking sites for both parents and children at www.bebo.com/Safety.jsp Another recommended site for parents is www.saferinternet.org.
  • The best way to guard against such threats is to install software like F-Secure Internet Security 2009, which updates your computer’s defenses automatically and makes sure you won’t be the one spreading worms among your network of friends. It’s also important to update your web browser, so remember to click on the security updates for Internet Explorer and Mozilla Firefox, or any other browser you are using. This helps to keep your computer patched up against the viruses.
Warnings:
  • Social networking sites are also used by predators and pedophiles searching for possible victims. It’s easy for anyone to adopt false identities on the Web, so you should maintain a healthy skepticism over what you see and hear on social networking sites. The bright young student you are conversing with could always be a middle-aged fraud. If you want to meet a person who you have befriended online, always do it in a public place, preferably accompanied by someone.
  • Many online social networks encourage users to import content like video clips and also accept third party add-on applications. This can be exploited by virus writers as a way of getting malicious code into the networks, such as the worm which spread rapidly on Orkut’s web site last year, infecting an estimated 655,000 users in Brazil.
source: www.wikihow.com

Sunday, December 6, 2009

How to be Safe in the Chat Rooms

The internet is a place to make new friends. It is easy to just chat with someone. However, you have to be careful and listen carefully to what is being said. After a while, you can tell if someone is lying or is really becoming a friend. You also have to listen to the questions that are asked, because many adults pretend they are young and friendly just to lure the unsuspecting into a trap to meet them for sex. Be careful and watch the information that you yourself give online.

Steps:
  1. Watch the way others approach you or start a conversation. If they start asking questions about you, like where you live or if you are home alone, then they are not trying to be friends. They are trying to find out personal information so that they can possibly harm you. Stay away from these people. Do not reply, and if they insist, shut off your computer.
  2. Allow your inner self to hear what they are saying. Suppose someone starts talking to you, and tells you about school. You can chat back and forth without getting personal. They make you laugh and you kid around with them. You talk about teachers, homework, and movies. This is the start of a friendship. Continue with this type of person, but again, listen for warning signs. This is called a 'red flag' on the Internet. Once you sense a red flag, discontinue the conversation.
  3. Understand that if a person on the chat starts the conversation by asking your age, where you live, and if your parents work, this is a red flag. Stop the conversation, or do not give out correct information. Understand however, that this person does not want to be a friend.
  4. Pictures Are Not Recommended. Even if your picture doesn't show street names, license plates, or any PI, pictures are showing what you (or your friends!) look like.
  5. Any sexual language like "You wanna do?", and you should leave and tell someone (like the police) IMMEDIATELY. No exceptions.
  6. Cyber-violence (unless make-believe, like shooting orbs of water out of your hands) is not acceptable either. If anyone says "*punches u and u bleed*" or anything like that, leave and tell.
  7. Telling is not tattling. If someone hurts you or makes you feel uncomfortable, online or offline, you should always tell someone.
  8. Know you are not alone. Many kids get harassed on the internet, but now you know what to do if you are added to that already large group of kids
Tips:
  • The Internet is a great place to meet others with the same interests.
  • Talking to school friends over a chat program makes it easy to talk about homework or school activities.
  • It is better not to trust strangers in chat rooms; be wary, and be careful.
  • Note that just because the chat room is supposed to be just for one gender, or everybody is supposed to be of one religion, on the internet anybody can claim to be anybody else.
  • PI means Private Information
  • Remember, the internet is serious business.
source: www.wikihow.com

How To Add Fun Games to Your Website For Free

Game websites are popular for not only kids but for many adults as well. Whether it's classic pacman or an action-rpg, everyone is in to some kind of video game. If you want your website to enhance to a level where not only close friends and family see it, but many others as well, the following steps will tell you everything you need to know.

Steps:
  1. Go on to a website, such as freeonlinegames.com, freegamesforyourwebsite.com, or miniclip.com, and search for whatever game you would like.
  2. When you find the game you want, try and find a box that says "embed" and copy the code inside.
  3. Finally go to your website editor and copy the code onto the page you would like it to be on.
Tips:
  • If you are targeting not only friends and family but other people, choose games not only you would like to play but the majority of people would like to play.
  • NEVER copy a game that doesn't clearly show that it is allowed to be copied.
source: www.wikihow.com

Saturday, December 5, 2009

Free Download AnalogX LinkExaminer 1.01




A site has many links that lead to other sites or pages which link to the site sama.banyaknya be difficult to track because of the broken link. therefore, currently up several sites that include the broken link information to a user who visits the page that can be corrected by the web administrator.
Broken link is usually caused by the loss of the deleted pages, moving or changing the location of the file name. Another way to detect broken links is to use a special application, the Examiner AnalogX Link.
These applications scan one page sites and the other one through the link. Scanning output can be seen at the interface AnalogX LinkExaminer can even export in CSV format and a Google-compatible XML sitemaps.


click here for download


source : www.analogx.com


Friday, December 4, 2009

E Card

E-card
An e-card is similar to a postcard or greeting card, with the primary difference being that it is created using digital media instead of paper or other traditional materials. E-cards are made available by publishers usually on various Internet sites, where they can be sent to a recipient, usually via e-mail. It also considered more environmentally friendly compared to traditional paper cards. E-card businesses are considered environmentally friendly because their carbon footprint is generally much lower compared to paper card companies and because paper is not used in the end product.
E-cards are digital "content", which makes them much more versatile than traditional greeting cards. For example unlike traditional greetings, e-cards can be easily sent to many people at once or extensively personalized by the sender. Conceivably they could be saved to any computer or electronic device or even viewed on a television set, however e-card digital content has not yet progressed as far as digital video or digital audio in terms of varied usage.

Usage
Typically an e-card sender chooses from an on-line catalog of e-cards made available on a publisher's web site. After selecting a card, the sender can personalize it to various degrees by adding a message, photo, or video. Finally the sender specifies the recipient's e-mail address and the web site delivers an e-mail message to the recipient on behalf of the sender.

Printed e-cards
Some e-cards are intended to be printed out rather than sent via e-mail; to most people, however, these are not considered e-cards, but are simply home-made greeting cards. The advantage to this over a traditional greeting sometimes can be cost savings, or sometimes simply the ability to "create" something for the recipient rather than choosing a fully completed paper card.

Technological evolution
E-card technology has improved significantly since 1984[citation needed], about the time of its inception. One technical aspect that has remained mostly constant is the delivery mechanism: the e-mail received by the recipient contains not the e-card itself, but an individually coded link back to the publisher's web site that displays the sender's card exactly as it was originally configured.

Postcards
"Postcards" use static (non-moving) images. These were the first type of e-card in use. The recipient sees a single artistic image, accompanied by a personalized greeting message.

animation
This type of e-card is based on two-dimensional vector animation controlled with a scripting language. The format is proprietary to Adobe; however, widespread usage of Adobe's software allows this type of card to be easily viewed on most of today's computers. The recipient sees an animated short usually 15–30 seconds in duration. The animation often appears to have a cartoon style due to the nature of the content, though some Flash creations can be quite sophisticated and realistic. A sound track which may contain speech or music usually accompanies the animation.
Flash animated greeting cards can include interactivity, for example, asking the viewer to choose a picture to animate; however, most Flash e-cards are designed to convey the sentiment of the sender through simple observation.
Flash animated cards are offered today by almost all major e-card publishers and are consequently the most common format used.

Video ecards
"Video ecards" use a combination of personalized text and video to convey the message to the recipient.

Mobile E-Cards
With the advance in mobile technologies, Multimedia Messaging Service (MMS) which is basically picture SMS, became more popular. E-cards can now be sent to mobile devices and phones. Mobile e-cards or 'MCards' as they are more commonly known are then offered by different mobile content providers and carriers. Similar to e-cards, mCards can contain multiple pictures, music and text messages.
One of the first companies that created MCards is a Dutch Company called Mgreetings (established in 2003). MCards can be sent from a PC in a similar way as sending ecards. Users can go to a website online, select a card enter the recipient's mobile number, and that card will be sent to the recipient's mobile phone as an MMS.

Web based multi-media ecards
The web-based card creation has been evolving becoming more creative. The user can create greeting cards online choosing backgrounds, drag and drop images, animations, smileys and write text that look like handwriting. The ecard may contain videos and music as well.

Face Upload ecards
Flash 10 technology now enables sites to develop bespoke applications which can upload photos, manipulating them and cut out the head from it. The user can then embed it onto an animation so as to achieve a much higher level of personalisation.

History
The greeting card metaphor was employed early in the life of the World Wide Web. In 1995, E-Cards.com began hosting online greetings featuring nature and wildlife photos - the site was one of the first "E" named sites,[citation needed] so named to evoke both the electronic and environmental nature of its cards. By Valentine's Day 1996 online greetings were popular enough to be documented. That year, Valentine's cards were offered by Infobahn.com and Sony Entertainment, among others.
In October 1999, Excite@Home bought the web site Blue Mountain Arts for $780M (which represent a price of $71 per unique monthly user).[citation needed] The transaction has been referenced by CNN and Business 2.0 as evidence of the Dot-com bubble. On September 13, 2001, three weeks before filing for bankruptcy on October 1, 2001, Excite@Home sold BlueMountain.com to American Greetings for $35M, or $3.23 per unique monthly user.[citation needed] The web site BlueMountain.com remains a large web site, primarily focused on e-cards. In June 2008, JustAnotherDotCom.com purchased the free e-card site Greeting-cards.com and added it to their own greeting card site, which made them one of the largest e-card sites in the world[citation needed].
Originally, most e-cards were free, by virtue of being sponsored by advertising. While free greeting cards are still the most prevalent and popular, some sites charge for either all e-cards or special premium e-cards. Others charge an annual membership which enables members to send cards for the duration of the membership.[citation needed]
Several non-profit organizations offer free ecards as a way of having a supporter introduce the organization to another individual. In 2006, SOS Children's Villages - USA began offering free ecards for many occasions such as birthdays, thank yous, and Mother's Day.

Security
Since many e-card companies are privy to the e-mail address of the recipient and often also the sender, and whether the recipient reads the card, spammers can use e-cards for finding active e-mail addresses.
Sending an e-card to a given recipient invariably involves giving that recipient's email address to the e-card service – a third party. As with other third-party email services (such as mailing-list companies), the operator has the chance to misuse this address. One example of misuse is if the e-card service sends advertisements to the recipient's address. Under anti-spam rules used by major ISPs, such advertisements would be spam, since the recipient never asked ("opted in") to receive them. The e-card sender as well as the service could be held responsible for the act of spamming, since while the service sent the spam, the e-card sender provided the address
In some cases, it may be illegal for an organization or business to use an e-card service to send greetings to its customers. For instance, data privacy laws may forbid a business from disclosing information about customers to a third party – including names and email addresses
In late June 2007 a spat of emails with the subject line "You've received a postcard from a family member!" and other similar subjects, was seen making their way across the internet. Unfortunately most of these emails contained links to malicious web sites where Javascript was used to exploit the browser in order to compromise a system, or contained a link to a malware file masquerading as an e-card.

source: www.wikipedia.com

Thursday, December 3, 2009

Windows Live Mail



Windows Live Mail (formerly named Windows Live Mail Desktop, code-named Elroy) is an e-mail client from Microsoft's Windows Live set of products. It is intended to be a successor for Outlook Express on Windows XP and Windows Mail on Windows Vista. The Windows Live Mail version numbering starts at 12 because this application is an advancement of Outlook Express/Windows Mail, not an entirely new application. Windows Live Mail is developed by the same team that wrote Windows Mail.
The application is available for download via the Windows Live Essentials suite


History
Version 12
The first version of Windows Live Mail was released on November 6, 2007.
Windows Live Mail has all of the features of Windows Mail. It also adds the following new features:
• Support for Web-based e-mail accounts including Windows Live Hotmail, Gmail/Google Mail, and Yahoo! Mail Plus.
• A different user interface which matches the other Windows Live "Wave 2" applications
• Synchronization with Windows Live Contacts
• Support for RSS feeds. Notable features include the ability to reply directly via email to the author of an item that appears in an RSS feed, and the ability to aggregate multiple feeds into a single folder. The RSS functionality requires Internet Explorer 7.
• Multi-line message lists, as in Outlook
• Emoticons can be used in e-mails and other functions
• In-line spell checking
• Separate inbox folders for different POP accounts
• Improved support for sending picture files in e-mails through the Photo email feature which uploads pictures to a web-based service and sends the URL and thumbnails in the mail. It can also perform basic photo correction and apply different border effects to pictures.
Version 14
A beta version of Windows Live Mail was released in September 2008. It features a new user interface which, in common with the other Windows Live "Wave 3" beta applications released at the same time, has no icons on the toolbar buttons. It also features a new calendaring function. Calendar events automatically synchronise between Windows Live Mail and the Web-based Windows Live Calendar. A "beta refresh" version of Windows Live Mail was released on December 15, 2008, and this version was officially released as the final version on January 8, 2009.
Version 14 still contains the same MIME problem with signed mail that Outlook Express has.


Differences from Windows Mail / Outlook Express
• Ability to view and edit HTML email by source has been removed.
• Scripted stationery is not supported.
• In version 14, toolbar icons are absent.
• Locally installed help documentation is not available.
• The Identities feature is not available.
• Supports using different mailboxes with separate folders (inbox, junk and so on).
• Supports DeltaSync, a proprietary protocol for access to Windows Live Hotmail e-mail accounts.
• Supports the WebDAV HTTP-based protocol (web-based e-mail accounts). Outlook Express supported WebDAV but Windows Mail did not.
• Supports full-text index-based search if Windows Search is installed.



Source : www.wikipedia.com

Wednesday, December 2, 2009

Free Download Miranda 0.8.10

Miranda IM is a multi-protocol instant messenger client for Windows. Miranda IM uses very little memory and is extremely fast. It requires no installation and can be fitted on a single floppy disc. Its powerful plugin system makes Miranda IM very flexible. Only the most basic features are built in, but there are currently more than 350 free plugins available for download that allows users to extend the functionality of Miranda IM.
Available Protocols are:
  • AIM (AOL Instant Messenger)
  • Gadu-Gadu
  • IAX (Inter-Asterisk Exchange)
  • ICQ
  • IRC (Internet Relay Chat)
  • Jabber
  • MSN
  • Netsend
  • Tlen
  • Yahoo
  • And more...
Click here for download

Tuesday, December 1, 2009

HTML e-mail

HTML e-mail is the use of a subset of  HTML (often ill-defined) to provide formatting and semantic markup capabilities in email that are not available with plain text.
Most graphical e-mail clients support HTML e-mail, and many default to it. Many of these clients include both a GUI editor for composing HTML e-mails and a rendering engine for displaying received HTML e-mails.
HTML mail allows the sender to properly express quotations (as in inline replying), headings, bulleted list, emphasize text, subscripts and supercripts, and other visual and typographic cues to improve the readability and aesthetics of the message, as well as semantic information encoded within the message, such as the original author and Message-ID of a quote. Long URLs can be linked to without being broken into multiple pieces, and text is wrapped to fit the width of the user agent's viewport, instead of uniformly breaking each line at 78 characters (defined in RFC 5322, which was necessary on older text terminals). It allows in-line inclusion of tables, as well as diagrams or mathematical formulae as images, which are otherwise difficult to convey (typically using ASCII art).

Adoption

Since its conception, a number of people have vocally opposed all HTML e-mail (and even MIME itself), for a variety of reasons.[2]. The ascii ribbon campaign is an internet phenomenon advocating that email should continue to be sent in Human Readable ASCII text format. While still considered inappropriate in many newsgroup postings and mailing lists, its adoption for personal and business mail has only increased over time. Some of those who strongly opposed it when it first came out now see it as mostly harmless.[3]
According to surveys by online marketing companies, adoption of HTML-capable email clients is now nearly universal, with less than 3% reporting that they use text-only clients.[4] A smaller number, though still the majority, prefer it over plain text.[5]

Compatibility

As HTML mail is more complex than plain text, it is also more prone to compatibility issues and has problems with rendering consistently across platforms and software.
Some popular clients do not render consistently with W3C specifications, and many HTML e-mails are not compliant, either, which may cause rendering or delivery problems, especially for users of MSN or Hotmail.[4]
In particular, the tag, which is used to house CSS style rules for an entire HTML document, is not well supported, sometimes stripped entirely, causing in-line style declarations to be the de facto standard, even though they are not optimal from a semantic web point of view.[6][dead link] Although workarounds have been developed,[7] this has caused no shortage of frustration among newsletter developers, spawning the grassroots Email Standards Project, an acid test which grades email clients on their rendering of an acid test, inspired by those of the Web Standards Project, and lobbies developers to improve their products.[8] To persuade Google to improve rendering in Gmail, for instance, they published a video montage of grimacing web developers, resulting in attention from an employee.

Style

Some senders may excessively rely upon large, colorful, or distracting fonts, making messages more difficult to read.[9] For those especially bothered by this formatting, some user agents make it possible for the reader to partially override the formatting (for instance, Mozilla Thunderbird allows specifying a minimum font size); however, these capabilities are not globally available. Further, the difference in optical appearance between the sender and the reader can help to differentiate the author of each section, improving readability.

Multi-part formats

The default e-mail format according to RFC 5322 is plain text. Thus e-mail software is not required to support HTML formatting. Sending HTML formatted e-mails can therefore lead to problems at the recipient's end if it is one of those clients that do not support it. The recipient may see the HTML source code or nothing at all.
Many e-mail clients are configured to automatically generate a plain text version of a message and send it along with the HTML version, to ensure that it can be read even by text-only e-mail clients, using the Content-Type: multipart/alternative, as specified in RFC 1521.[10][11][12] The message itself is of type multipart/alternative, and contains two parts, the first of type text/plain, which is read by text-only clients, and the second with text/html, which is read by HTML-capable clients. The plain text version may be missing important formatting information, however. (For example, an equation may lose a superscript and take on an entirely new meaning.)
Many[citation needed] mailing lists deliberately block HTML e-mail, either stripping out the HTML part to just leave the plain text part or rejecting the entire message.[citation needed]

Message size

HTML e-mail is larger than plain text. Even if no special formatting is used, there will be the overhead from the tags used in a minimal HTML document, and if formatting is heavily used it may be much higher. Multi-part messages, with duplicate copies of the same content in different formats, increase the size even further. The plain text section of a multi-part message can be retrieved by itself, though, using IMAP's FETCH command.[13]
Although the difference in download time between plain text and mixed message mail (which can be a factor of ten or more) was of concern in the 1990s (when most users were accessing e-mail servers through slow modems), on a modern connection the difference is negligible for most people, especially when compared to images, music files, or other common attachments.[14]

Security vulnerabilities

HTML allows for a link to have a different target than the link's text. This can be used in phishing attacks, in which users are fooled into believing that a link points to the website of an authoritative source (such as a bank), visiting it, and unintentionally revealing personal details (like bank account numbers) to a scammer.
If an e-mail contains web bugs (inline content from an external server, such as a picture), the server can alert a third party that the e-mail has been opened. This is a potential privacy risk, revealing that an e-mail address is real (so that it can be targeted in the future) and revealing when the message was read. For this reason, some e-mail clients do not load external images until requested to by the user.
During periods of increased network threats, the US Department of Defense converts all incoming HTML e-mail to text e-mail.[15][DOD bars use of HTML e-mail, Outlook Web Access dead link]
The multipart type is intended to show the same content in different ways, but this is sometimes abused; some e-mail spam takes advantage of the format to trick spam filters into believing that the message is legitimate. They do this by including innocuous content in the text part of the message and putting the spam in the HTML part (which is what displays to the user).
Most e-mail spam is sent in HTML for these reasons, so spam filters sometimes give higher spam scores to HTML messages

source : www.wikipedia.com

Monday, November 30, 2009

Network Inventory Reporter

 An application that can inventory the entire network assets without installing any client side or other programs on remote PCs.


Network Inventory Reporter is a Administrator solution management software that collects and reports network hardware, software, program groups, and programs for all network computers. Network Administrators can inventory the entire network assets without the need to install any client side or other programs on remote machines.


This software will enable you to identify protected and unprotected wireless networks within receiving range of your network.Using Network Inventory Reporter System Administrator in the Network Inventory Reporter will receive the following hardware and software inventory data: Domain Role, Operating System, Computer Manufacturer, Computer Model, Processor, Motherboard, On Board Device(s), BIOS, Physical Memory, Video Controller, Desktop Monitor, Floppy Disk Drive, Disk Drives, DVD/CD-ROM Drives, Logical Disks, Network Adapter, Mac Address, Modem, Printer(s), USB Controller(s), USB Hub, Sound Device.


The Network Inventory Reporter software reports Hot Fixes, installed software and drivers. These reports can be saved into a database, spreadsheet and matched up to software licenses, software renewal dates. With The Network Inventory Reporter System Administrators can view, store, anaylze all running processes and services, shared resources; and in doing so, System Administrators can identify hardware purchases (hard drive space or RAM memory shortages);software issues or software and hardware conflicts. All Network Inventory Reporter reports can be saved, parsed, and printed.


Limitations:
· 30 days trial


Click here for download


Detecting Spam an Email

Checking words: false positives

People tend to be much less bothered by spam slipping through filters into their mail box (false negatives), than having desired e-mail ("ham") blocked (false positives). Trying to balance false negatives (missed spams) vs false positives (rejecting good e-mail) is critical for a successful anti-spam system. Some systems let individual users have some control over this balance by setting "spam score" limits, etc. Most techniques have both kinds of errors, to varying degrees. So, for example, anti-spam systems may use techniques that have a high false negative rate (miss a lot of spam), in order to reduce the number of false positives (rejecting good e-mail).
Detecting spam based on the content of the e-mail, either by detecting keywords such as "viagra" or by statistical means, is very popular. Such methods can be very accurate when they are correctly tuned to the types of legitimate email that an individual gets, but they can also make mistakes such as detecting the keyword "cialis" in the word "specialist"; see also Internet censorship#"By-catch". The content also doesn't determine whether the email was either unsolicited or bulk, the two key features of spam. So, if a friend sends you a joke that mentions "viagra", content filters can easily mark it as being spam even though it is neither unsolicited nor sent in bulk.

Lists of sites

The most popular DNSBLs (DNS Blacklists) are lists of IP addresses of known spammers, open relays, zombie spammers etc.
Spamtraps are often email addresses that were never valid or have been invalid for a long time that are used to collect spam. An effective spamtrap is not announced and is only found by dictionary attacks or by pulling addresses off hidden webpages. For a spamtrap to remain effective the address must never be given to anyone. Some black lists, such as spamcop, use spamtraps to catch spammers and blacklist them.
Enforcing technical requirements of the Simple Mail Transfer Protocol (SMTP) can be used to block mail coming from systems that are not compliant with the RFC standards. A lot of spammers use poorly written software or are unable to comply with the standards because they do not have legitimate control of the computer sending spam (zombie computer). So by setting restrictions on the mail transfer agent (MTA) a mail administrator can reduce spam significantly, such as by enforcing the correct fall back of Mail eXchange (MX) records in the Domain Name System, or the correct handling of delays (Teergrube).


source : www.wikipedia.com



 

Sunday, November 29, 2009

Free Download Webcam Viewer 5

This is where you can find the best WebCams on the net! A WebCam is a small camera which take pictures in a fixed interval from a specific place in the world. These pictures can be viewed on this page.

source: www.webcamviewer.de

click here for download

Saturday, November 28, 2009

How To Create an EffectiveEmail Flier



Considered as one of the most effective marketing tools, e-mail fliers have become quite a rage and a necessity in the business world, fast providing a cheaper and more focused alternative to the traditional printed flier.
An email flier draws the attention of the customer and presents the benefits and features of a product or service or company in an appealing manner.
With the capability of reaching out to a large number of potential customers in a matter of few seconds, email fliers provide businesses and effective way to promote their products or services amidst a targeted audience with the help of a select mailing list.
To design an effective and professional looking email flier, you need to follow some important steps:
  1. The most important starting point of an email flier is to decide what its objective is – what it intends to do or achieve. An email flier is in other words a beautifully designed advertisement sent out over the email chain. Hence, you must know for sure what you want to convey to your customers - whether you want to inform them about recent launches in your product line or promote a particular product or services or announce a special promotional offer and so on.
  2. Secondly, define your target audience so as to ensure that the email flier reaches the most high potential target group. Prepare a demographic profile of your customer base identifying their age group, location, preferences, gender, education level, etc. Having knowledge of who you are writing for would help you to meet the requirements of your clients.
  3. Build a mailing list containing the email ids of your customers And keep updating your mailing list from time to time.
  4. Review quality email fliers from leading sources. There are email directories such as Adpera.com and iStorez.com that show professional email campaigns from the internet's top retailers. Retailers spend a lot of money on graphic designers, marketing professionals and testing various approaches. You will quickly notice there are some common "best practices" used through out the industry.
  5. Make a rough draft of the design of the email flier by deciding where to put the logo of your company, content, images etc. Decide where you want to place the images, whether on top of the flier or in the centre.
  6. Write a thought provoking headline. Project the main benefit of your product or service in the headline so that the reader instantly knows what he/she stands to gain. Make it attractive and eye catching. Remember that the headline should act like a magnet to draw the attention of the readers.
  7. Use sub-headings to break the text in the right places. Don’t use long paragraphs and long winding sentences. Keep the content short and crispy so that the readers can understand what you want to say at first go.
  8. Write the content as if you are having a conversation with the readers. Directly address the reader and tell him/her about the benefits he/she can get from the products or the services.
  9. Stick to just one type of font. Don’t slap in too many different kinds of fonts in the mistaken belief that it looks creative. It doesn’t. The use of different types of fonts in one fliers creates confusion and makes the flier look amateurish.
  10. Insert appealing pictures in the email flier. For a profound effect, put one large picture instead of a number of smaller pictures.
  11. Use sufficient amount of white space to break up the text. Proper usage of white space makes the copy look interesting and attracts the reader.
  12. Don’t keep the border very close to the text. It makes the copy look too clumsy.
  13. Include a free coupon or some discount in the flier and encourage the reader to take advantage of the freebies. Include the link of the appropriate webpage which you want your customers to visit.
  14. Include a call to action. Encourage the reader to email back or call back. Include information of your website url, email and the contact number.
 source : www.wikihow.com
 

Friday, November 27, 2009

iGoogle


iGoogle (formerly Google Personalized Homepage and Google IG), a service of Google, is a customizable AJAX-based startpage or personal web portal (much like Netvibes, Pageflakes, My Yahoo!, and Windows Live Personalized Experience). Google originally launched the service in May 2005. Its features include the capability to add web feeds and Google Gadgets (similar to those available on Google Desktop).
On April 30, 2007, Google renamed "Google Personalized Homepage" to "iGoogle".[2] As of 17 October 2007 (2007 -10-17)[update] Google had made the service available in many localized versions in 42 languages, and in over 70 country domain-names

Gadgets

iGoogle gadgets interact with the user and utilize the Google Gadgets API. Some gadgets developed for Google Desktop can also be used within iGoogle. The Google Gadgets API is public and allows anyone to develop a gadget for any need.[5]
Google also allows all users to create a special gadget that does not require the use of the Gadgets API. The gadgets are designed to be shared with friends and family. The special gadgets must be created using an online wizard and must belong to one of the following types:
  • "Framed Photo" – displays a series of photos.
  • "GoogleGram" – creation of special daily messages.
  • "Daily Me" – displays user's current mood and feelings.
  • "Free Form" – allows the user to input text and an image of their choice.
  • "YouTube Channel" – displays videos from a YouTube channel.
  • "Personal List" – allows the user to create a list of items.
  • "Countdown" – countdown timer.
  • "Daily Literary Quote" – displays literature-related quotes served up by ModeRoom Press.
Some of the developer-made gadgets include:
  • "Meteo-si": displays the current weather and the weather forecast for selected area(s)
  • "Ebay gadget": searches for items on Ebay
Throughout 2009, iGoogle released a sidebar at the side of the home page which also altered the overall appearance of the iGoogle pages. It allows users of Gmail to chat from their homepage without going to gmail.com along with organising the iGoogle tabs vertically instead of horizontally along the top. The addition to this sidebar feature upset many users of iGoogle, many voicing their opinions in the Google Forums, as currently there is no way to opt-out of the change to the site design.

 

Themes

With iGoogle, users can select unique themes for their Google homepages: some themes designed by Google itself and others by the userbase

Artist themes

In April 2008, Google began offering a choice of themes by professional artists

 

Experimental iGoogle

On July 8, 2008, Google announced the beginning of a testing period for a new version of iGoogle which alters some features, including replacing the tabs with left navigation, adding chat functionality, and a canvas-view gadget for RSS.[7] Users were selected for this test and notified when they logged in by a link to a brief description and further links to forums. On the forums, it was explained[by whom?] that there was no opt-out, as a control for the test. Further, there was no information on how long the test would continue. Many expressed dissatisfaction with the new version and with the inability to opt-out.[8]
On October 16, 2008, Google announced the release of this new version of iGoogle and retired its older format. The release did not initially include the persistent chat widget. It does include the left navigation in place of tabs as well as a change to widget controls, however.[9] The stated purpose is to prepare for OpenSocial, with the new canvas view stated as playing an important role in that.[10]
On October 17, 2008, InformationWeek[11] reported "a vocal group of users" as unhappy with the changes. They[who?] point out that many users don't want change forced on them, and that this is a general problem with cloud software under a service provider's control.
A workaround to restore the original tab layout was found by attaching "?gl=all" to the end of the iGoogle URL. On June 4, 2009, this workaround was eliminated. Within days, another workaround was discovered. Simply changing the URL ending to "?hl=all" would again restore the original tab layout, with some missing links across the top of the home page, including "Maps" and "more".
On November 18, 2009 this workaround was again eliminated resulting in the tabs being placed on the left and with the links still missing. This led to an immediate resurrection of the controversy over user choice, both in the UK and world-wide, as many people unhappy with the new layout imposed on US users had switched to the UK Google site where the workarounds still worked. Within hours, the most frequently asked question on the help forum was how to restore the old layout, and there was a large number of feature suggestions to the same effect on the Google product ideas page. Other solutions have come to the fore, which require adds-ons, greasemonkey scripts or bookmarklets

Source : www.wikipedia.com