Saturday, January 9, 2010


Mobile phone
Nokia 6700 classic
The Nokia 6700 classic is a series 40 6th Edition phone,
supporting quad-band GSM 850/900/1800/1900 and triple-band WCDMA 900/1900/2100.
Other key features include integrated A-GPS with maps included, a 5.0 megapixel camera with LED flash,Webkit Open Source Browser, Flash lite 3.0, Bluetooth 2.1+ EDR and MIDP java 2.1 with additional java APls.Supported WCDMA frequencies depend on the region where the device is avallable.
Spec cations
General: 2G Network GSM 850/900/1800/1900, 3G NETWORK HSDPA 900/1900/2100

Display : Type TFT, 16M colors

Size : 240+ 320 pixels , 2.2 inches

Data : GPRS Class 32, HSCSD yes, EDGE Class 32, 3G HSDPA, 10 Mbps, HSUPA 2 Mbps, WLAN No , Bluetooth yes, v2.1 infrared port No , USB YES, v2.0 microUSB

Camera : Primary 5 MP, 2592=1944 pixels autofocus, LED flash ,
Messaging : SMS , MMS 1.3 (up to 600KB), e-mail IM Browser WAP 2.0/+HTML, HTML ,

Battery : Standard battery , Li-lon 960 mAh (BL-6Q) , STAND BY up 300 h, Talk time up to 5 h (2G) /4 h (3G) , Music play up to 20 h

Price : 21,890 rupees .


printer Hp officejet


This is an easy -to use, cost effective, all in -one imaging device
whit automatic document teeder(ADF) .It is advertised to deliver impressive colour documents at a lower cost-per page than most industry -leding inkjet printers. Boost productivity with the 20-page automatic document feeder, 100- sheet input paper tray and advanced features such as acan direct to PC/network folder/PowerPoint/Word application, and fax- to- computer capability. The performance is quite effective with print and copy speeds at up to 28 pages-per-minute (ppm) black, 22 ppm colour. send and receive faxes quickly at up to 33.6 kbps.Other key features include an integrated phone, a 100- sheet paper tray and more.

Friday, January 8, 2010




Google AdSense Being Blocked By Kaspersky Security Software



Google AdSense adds are currently being blocked byKaspersky anti virus and Internet security software. This started sometime yesterday with their latest releases of their security program.
One AdSense publisher emailed Kaspersky to let them know and he received a reply "within minutes" saying:
Hello, Sorry, it was a false detection. It will be fixed in the next update.
Thank you for your help.
I assume they release updates often and the update will fix the issue soon.
Actually, it seems if you update the software now, it will resolve the issue. You just have to hope your readers update their software.
post by beldsan email scorpion1870@gmail.com

bing Now a Seriou Challenger to Google





Give undistinguished history of microsoft's late and unlamented live
search engine, the predecessor to bing, it,s easy to dismiss redmond as a haplees also-ran in the search market.but given the vast sums of mony and resources that microsoft is investing in its fledging google challanger,this could change in ahurry. Lunch in my this year,Bing initially recived a tepid responce;some critics essentially callled it live search with a new coat of paint. But microsoft is nothing if tenacious. (Old-timers will recall how badly the early versions of windows stank before
Redmond finally found success with version 3.0) steadily grading Bing since may, including some pretty useful innovations announced.
Once new and noteworthy upgrade is the inclusion of search result from wolfarm Alpha , an oddball, "computational knowledge search tool that's probably too geeky for the everage user. when integratid with a mainstream query engine, how ever, wolfarm alpha algorithms prove their mettle by retuning action able data rather than gust a page of links. microsoft provides a few axample on its bing blog.
search for 'bmi,' for instance, and bing diaply wolfarm Alpha 's body mass index calculator at the top of the result page. it's debatable
whether bing is gaining market shara , however,or simply spining its wheels. According to a research firm, Bing's shara of Web seaches rose to9.57 percent in october 2009, up from 8.96 percent in september. of course , bing was still a distant third behind google
(70.6 percent) and Yahoo (16.14 percent). flash back to may and microsoft live search market. Not a lot of improvement there , despite microsoft,s extensive and expensive bing markating blitz.
if you're a daihard google search fan , don't hate bing embrace it. because microsoft's nipping at google's heels will only make the world's dominant search engine that much better. in fact, it appears that google is already playing catch- up. last month it lunched a new tool called similar images, a feature that 's very much like one first seen in bing and live search. (to be fair,similar images was first lunched in test mode in google labs in April.)
Bing has't amazed any one yet--and it may very well have to if it hopes to grab significant market shara from google. and let's not forget that google has the resources and determination to match and surpass any of bing 's enhancements. this fight should be fun to watch.



In the name of Allah, the Beneficent, the Merciful


1] for the protection of the qureaish-
2]their protection during their trading caravans
in the winter and the summer-
3]So let them serve the lord of this House,
4] Who feeds them against hunger and gives them security against fear.

Thursday, January 7, 2010

How to Add Link Fields

Add the option to include a related URL and podcasting enclosure links with each of your posts.

1. Go to the Blogger.com.

2. Sign in and go to the Dashboard.

3. Now Go to the Settings.

4. Click on the Formatting.

5. Go down and when you see this option " Show Link fields "
if you see option " No "

6. Then do this option to " YES "

7. Now Save Setting and go to the Posting and see the Enclosure link

How to make good looking your new post

How to create a new post
You can make good looking your new post in blogger. Blogger give all setting for making good post, you can see the above picture many setting in this,

1.Open in new tab Blogger .com

2. Sign in and Go to the Dashboard

3. Click on the Edit html and type your post with html code.

How to chenge your blog url

How to chenge your blog url

this process.

1. Go to the Blogger.com.

2. Sign in and Go to the dashboard.

3. Now go to the settings and Click on the Publishing

7. Enter your new URL in the box and type picture code and in last save settings.

How to Read Allow Your Blog to Only Blog Author

You can read allow your blog to your self and you can restrict your blog to only readers you choose.
These readers will need to log in before reading your blog.

1. First Go to the Blogger.com.

2. Log in and go to the Dashboard.

3. Go to the Settings and click on the Permissions


4. Now you can see there are showing clicks on Anybody means now anybody can read your blog.

5. You will need to change the click on Only Blog Authors then only author can read the blog.

6. when you click on only blog authors then you will allow to author.

SEO Starter Guide by Google Webmaster Central Blog



Image Credit

As a blogger, we always try to be knowledgeable on Google SEO tips and tricks. Thus, thousands of SEO related blogs have been appeared to fulfill the market needs.

For me, I’ve spent some times on Google’s SEO when I just started this blog. It’s a huge knowledge and SEO is always a mystery for webmasters as Google has never really disclose its search engine algorithm.

Undeniable, SEO is a hot key on Web as everyone is hoping to get better placement on Search Engine Result Page (SERP). Google actually understands that either.

In order to help webmasters to improve website’s performance, Google has released a "Search Engine Optimization Starter Guide" which covers some common areas where webmasters might consider optimizing such as improving title and description meta tags, URL structure, site navigation, content creation, anchor text, and more.

SEO Starter Guide by Google Webmaster Central Blog



Image Credit

As a blogger, we always try to be knowledgeable on Google SEO tips and tricks. Thus, thousands of SEO related blogs have been appeared to fulfill the market needs.

For me, I’ve spent some times on Google’s SEO when I just started this blog. It’s a huge knowledge and SEO is always a mystery for webmasters as Google has never really disclose its search engine algorithm.

Undeniable, SEO is a hot key on Web as everyone is hoping to get better placement on Search Engine Result Page (SERP). Google actually understands that either.

In order to help webmasters to improve website’s performance, Google has released a "Search Engine Optimization Starter Guide" which covers some common areas where webmasters might consider optimizing such as improving title and description meta tags, URL structure, site navigation, content creation, anchor text, and more.
norton internet security

Most of us have a love-hate relationship with our security software. Though we love the protection from online and other threats,
but hate the way the software drags down our daily activities and slows down our computers. Recently, symantec,one of the best hands at antivirus software made an all-out effort to reduce the suite,s impact on performance.And, what do you know-it
worked,Norton internet security 2009 affects performance less than any suite we,ve tested. And there,s more good news: The user interface is streamlined and simplified. most security tasks happenn in the back ground during idle time, eentireely with out user intervention.
even the installlation process is streamlined. the onlly thing you need do is click one big boutton that says you agree to the license-after that the software is fast and a half when i timed it ; activation took another minute ; and the initial livee update of malware difinationns required one more minute. fromm zero to 100 percent ready in under 4 minute? that's amazing!


Performence
surprisingle, when compared to past norton suites this editions is all about performence . the utility is designed from the botton up both to stay out of your way and to demonstrate that it's staying out of your way. the main windows includes a big CPU usage meter thatseparately tracks syestem-wide usage and usage specific to Norton when the syestem seems bogged down, you can see at a glance what's to blame.
Tasks like downloading new virus definitions or scanning for malware can take processing power away from user applications, so the product perform these duties only when the syestem has been idle fora while-10 minutes, by defult. a link above the CPU meter opeans a huge chart of CPU and memory usage over the last 90 minutes. typically you 'll see a spike in norten-specific CPUuse during times marked on the chart as idle the software also supplies a table showing when various background tasks last.
a link below the CPUmeter launches another performence tool, norten insight which speeds malware scanning by indentifying files that don't have to be scanned. it checks all executables on the computer against a data base of trusted programs and displays a big meter showing just how ,any files it has exempted. A full scan is proportionally faster after insight completes its analysis. if you dont't force this full syestem check by activaly lunching the tool, it will completes its analysis during idle time.
Norten's liveupdate runs every 8 hours to get new malware difinitions and any other needed updates. But in the fight against rogue software,8 hours is a long time-a modern threat can spread woorld wide in that times . so norten 's "pulse updates " feature checks for newmalware signatures every few minutes and streams in any that are available.

The Test


We installed norton on a syestem infested with malicious software of many type, among them adware, spyware, rootkits, Trogans, worms, and rogue antispyware. its speedy installatiion was a great boon, as was the fact that it doesn't require a reboot after installation. that post-install reboot is a stumbling block for many suites.. if the programes's real- time protection partially disables a kernal-mode malware sample the syestem may crash on reboot before there's any chance to run a full scan. norton's installation went smothly on all of the infested test syestem, though there were a couple of hiccups during the cleanup process.
scanning a standerd clean test syestem took the suite 50 minutes, quite a bit longer than most. usually 30 minutes is about. usually 30 minutes is about averag. However, that was before norten insight had finished processing. after norten insight indentified 90 percent of the files as trusted, a rescan took just 5 minutes.
Norten quarantines most threats automatically during the scan process. Other threats get removed at the end of the scan, after the user has had a change to close any open programs. in a number of cases, the scan reported that full cleanup would occur after reboot, but as long as the malware was completely deacitivated it did not insist on rebooting immediately. your machine wouldn't find the port close to attack ; he wouldn't find them at all because norten puts them in stealth mode. that's a good thing , but windows firewall can do the same.
The flips side of personal firewall protection is program control-keeping programs on your syestem from abusing access to the internet or network. early personal firewalls asked a million questions. every time a program attempted internet access for the first time, they'd ask the user wheather to permit it or not often in confusing terms. the user just isn't really qualified to make that decision, so norton handles handles program control completely on its own . it destroys known bad programs on sight and grants access to knowns and block them only if their actions appear malicious to be fair, ZoneAlarm (the original too-many-questions fire wall) has all but aliminated those confusing querise in its latest editi.

Network control
Norton's Network security map aerves a number of purpose. it shows all the devices connected to your network and report wheather your wireless network is secure;that is wheather it's encrypted . if other computers on the network are also rurunning norton, you can easily configure remote monitoring just turn on each using the same password, and they'll quickly find each other. by default norten protects your computer from attacks and unexpected traffic even within your own network . theb setting should be finr forcomputer, but it could conceivabely cause trouble for other type of devices. if it does and onely if it does, you can set that devices's trust level to "full trust." you can also lock out specific devices by setting their trust level to restricted, in the rare event that you've allowed an untrustworthey devices into your network

parantal control
many user dont't need perantal - control software, so symantec doesn't include it in the suites 's standerd installation package if you do need this feature, it's easy enough to install-just clicks a link and follow the instructions. the parental control pack is about a 20MDlive update . but do keep in mind that norten's parental-control solutions is limited in scope. it doesn't offer the internet time- control feature found in kaspersky, F-secure, and bitdefender. but atlest it does its on e task well; its categroy-based site blocking is browser-indeprndent, and the kids can't tamper with it.

Privacy control

if you instell the add-on pack you also get norton's old privacy control like many other suites , norton lets you records private information and prevent its transmission and prevent its transmision out of your computer via web forms , outgoing smtp e-mail or specific instant-messaging client . it's nicely implemented with a sport forn each item to define a list of URLexception. the exception feautere lets you define a site's password as private yet allow it at the actual site, so you can use it but not lose it. the saved data is completely exposed to anybody who has the privacy/parent password. that seems like a big mistake . here the approach used by Zone Alarm is great ; it stores private data using one-way encryption . when privacy control dedects that private data is about to be transmitted, norton pops up an alert and asks whether to allow or block the tramnsmision. no password is required, so you can't use privacy control to keep your kids from sending out privaye information. if you do choose to block the data norton replaces it with asterisks.

Logging on to access information on health insurance

Although it may seem hard to believe today but there was indeed a time when accessing information on health insurance schemes was almost an impossible proposition. People had to spend several hours to get through the telephone lines and equally frustrating was going through the tedious procedure of applying for critical illness cover. As most cases involving critical illness cover, had people with serious ailments it was excruciatingly painful for them to wait for their turn to come before they could apply for a suitable health plan to meet their needs.


Things changes after the internet penetration became a global phenomenon. People of age and social groups could easily access all information pertaining to the critical illness cover. Not only did it become extremely simple and convenient to find out all the details involving the procedure but also compare prices at the click of the mouse.

Earlier, it was required for potential insurance buyers to visit the websites of all the leading critical illness cover insurance providers individually. In present times, even that need is completely negated. With a number of online platforms, social networking sites and discussion forums emerging on a regular basis, it has become really simple to gain a complete insight into the insurance industry and check which policy has maximum benefits for people interested in buying a critical illness cover.

There are however a few points that need to be kept in mind by potential critical illness cover buyers to avert complications at a later stage. Some of these key points are as follows:

• While there are several online discussion platforms where existing as well as prospective critical illness cover buyers come together and share their experiences, not all should be considered the final word while making the final purchasing decision. It is important to ascertain and verify facts before investing money.
• It is considered a good option to visit the sites of as many insurance cover providers as possible to be able to make a comparative analysis of the services provided by them and the pricing factors. Therefore, do visit the websites of the insurance companies you are contemplating approaching as that would give you a comprehensive idea about the latest trends and norms.
• A number of insurance companies that specialize in critical illness cover plans have a live 24/7 customer care support. If you have doubts and require clarity, it is a good idea to seek help from these panelists who will be ready to help you out.
• Owing to the increasing popularity and prevalence of critical illness cover schemes, a number of fraudulent companies and internet hackers send umpteen numbers of spam mails to the inboxes of prospective critical illness cover buyers. On some occasions, a click may be enough to hack your PC while on several occasions it has been found that internet predators ask for personal information such as telephone number, credit card numbers etc. It therefore goes without saying that none of the confidential details must be shared online.



BUYER,S GUIDE
The tech world keeps spinning out new products to satisfy the needs of nerds and their abundance has ensured that prices are quite competitive. The year 2010 saw a handful of new devices_most of them were new and improved versions of their originals.Here is a look at the best tech bargains of the year that went by

Notebook

Notebook Pc (vj375EA)

Processor:

Intel core 2Duo Processor T6600 2.2 Ghz, 2MB L2 cache

operating system Installed:

Genuine Windows 7 Home Premium (64-bit)

standard memory:

3072MB

Maximum memory:

Supports up to 8GB DDR2

Hard Drive:

320GB SATA (5400 RPM)

Multimedia Drive:

Lightscribe Super Multi DVD Writer (+/R+/-RW) With Double Layer support

Display:

15.6-inch High- Definition HP LED Brightview infinity display (1366 + 768)

Sound:

Altec Lansing speakers

Keyboard:

Full size keyboard with integrated numeric keypad

Price: 63,000 rupees

Technology from arom around the news world

NEWS WORLD
TECHNOLOGY FROM AROUND THE

ONE MILLION XBOX USERSSS BANNED BY
MICROSOFFT
Microsoft ware gaint microsoft reecently up to one million users from its Xbox live syestem in order to weed out useers who have pirated their games. the bans will stop a user from playing any game on theirr Xbox 360 console, so affectid useers will be unable to play online against frienddd aven with a copy purchased legitimately. "All

X-BOX 360

consumerss should know that priacy is illagel and that modifing their Xbox 360console to play pirated disec viiolates theXbox live terms of use , will void their warrenty and result in a ban from Xbox live," microsoft said in the statement. " the health of thee video games business depends on costomers playing for the genuinee product and service they recive from manufacturers, ratailers, and the thid parties that supprot them ." the decision comes as a number of Xbox user have found their consoles unable to connect to Xbox liive after using a pirated version of the newly rreleased game call of Duty: modern warfare 2. it has been one of the most highly anticipated games of all time, with some reportindicating sales of up to seven milliion units in on eday. many Xbox users have complained about their inibality to play the new title after using a pirated copy, saying a large part of thee games requires online connectivity.

DOCTORS COLD SOON DIAGNOSE THE FLU OVER THE PHONE
A new type of softweere beeing developed in Queensland, Australia could lead to doctors dianosingpatient with the flu over the phone. the new technology, which is being develooooooped by both australian and US researchers, would see patiets cough into mobiles phone in order to recive a diagnoses. Udantha Abeyratne from the university of Queensland is working on methodes to fit smarts phone with tiny microphone that would alloww doctors to read the medical datta stored in a recording of a cough . He told that the neww technology was
"unorthodex ..the target is to buuild something that cannnn do screening in the faileed". abbbeyreatne , whhhho has previously worked on technology designed to analyze snoring in order to diagnose sleep apnea, was among a group of 76 researcheees to win a $UUUS 100,000 grant from the bill Gates" research foundatiion >thee technology works by analyzing the data contained in a recording of the last _ milisecond of a cough which regular contains sound that can help medical professionals diagnose illnesses> STAR analytical service < style="font-weight: bold;">massachusettes < style="font-weight: bold;">jaclyn smith saying thee technology is important >"it"s the mssymptom when a patient present< style="font-weight: bold;">ald btechnology from the 19th century." " there is no question that there is a lot of variabillity in the cough of people. but if theey can find certain parametrs to use cough to diagnose disease that could be fabulous. it could really improve diseasee diagnosis and help improve people's access to health care."

AUSTRALIAN DEVELOPER CREATES FIRST IPHONNE VIRUS
a 21-year -old australian student has created the world's first iPhone virus designed to infect phones that have not been protected by passwords. but the creator of the virus , Ashely Towns, has since retreated from the public eye after relasing the APP, blocking his Twitter account in order to prevent users from reading his updates. the virus will only affect phone thhhat are "jailbroken", where users digitally crack open the phone 's file syestem in order to install customized apps and user interface theme not approved by apply. the virus changes a user's wallpaper to a picture of 1980 pop star Rick astley, and display the world "ikee is never gonna give you up" - a referance to astley's hit song and towns'twitter account. but towns insists the virus is not malicious, will not affect a user's phone permaneently and can be easily arased. instead, he told that the virus was designed in order to exploitt "people' s laziness to change their passwordxd". " somebody with moreb malicious intent could have done any thing - read your SMSs, go thourgh your emailes, view your contact, photos - any thing ," he said . the virus comess after a number of seurity expert intheUS have flagged the ability for hackers to obtain personal information from iphones andd Macs, despite thee company 's marketing stratege that brands its prouducts as virus -free while some have doubted towns' ability to create an iphone virus as severalother hav4ee tried unsuccessfully, he maintain he can prove the authenticity of the virus by publishing its source code.

Technology from arom around the news world

NEWS WORLD
TECHNOLOGY FROM AROUND THE

ONE MILLION XBOX USERSSS BANNED BY
MICROSOFFT
Microsoft ware gaint microsoft reecently up to one million users from its Xbox live syestem in order to weed out useers who have pirated their games. the bans will stop a user from playing any game on theirr Xbox 360 console, so affectid useers will be unable to play online against frienddd aven with a copy purchased legitimately. "All

X-BOX 360

consumerss should know that priacy is illagel and that modifing their Xbox 360console to play pirated disec viiolates theXbox live terms of use , will void their warrenty and result in a ban from Xbox live," microsoft said in the statement. " the health of thee video games business depends on costomers playing for the genuinee product and service they recive from manufacturers, ratailers, and the thid parties that supprot them ." the decision comes as a number of Xbox user have found their consoles unable to connect to Xbox liive after using a pirated version of the newly rreleased game call of Duty: modern warfare 2. it has been one of the most highly anticipated games of all time, with some reportindicating sales of up to seven milliion units in on eday. many Xbox users have complained about their inibality to play the new title after using a pirated copy, saying a large part of thee games requires online connectivity.

DOCTORS COLD SOON DIAGNOSE THE FLU OVER THE PHONE
A new type of softweere beeing developed in Queensland, Australia could lead to doctors dianosingpatient with the flu over the phone. the new technology, which is being develooooooped by both australian and US researchers, would see patiets cough into mobiles phone in order to recive a diagnoses. Udantha Abeyratne from the university of Queensland is working on methodes to fit smarts phone with tiny microphone that would alloww doctors to read the medical datta stored in a recording of a cough . He told that the neww technology was
"unorthodex ..the target is to buuild something that cannnn do screening in the faileed". abbbeyreatne , whhhho has previously worked on technology designed to analyze snoring in order to diagnose sleep apnea, was among a group of 76 researcheees to win a $UUUS 100,000 grant from the bill Gates" research foundatiion >thee technology works by analyzing the data contained in a recording of the last _ milisecond of a cough which regular contains sound that can help medical professionals diagnose illnesses> STAR analytical service < style="font-weight: bold;">massachusettes < style="font-weight: bold;">jaclyn smith saying thee technology is important >"it"s the mssymptom when a patient present< style="font-weight: bold;">ald btechnology from the 19th century." " there is no question that there is a lot of variabillity in the cough of people. but if theey can find certain parametrs to use cough to diagnose disease that could be fabulous. it could really improve diseasee diagnosis and help improve people's access to health care."

AUSTRALIAN DEVELOPER CREATES FIRST IPHONNE VIRUS
a 21-year -old australian student has created the world's first iPhone virus designed to infect phones that have not been protected by passwords. but the creator of the virus , Ashely Towns, has since retreated from the public eye after relasing the APP, blocking his Twitter account in order to prevent users from reading his updates. the virus will only affect phone thhhat are "jailbroken", where users digitally crack open the phone 's file syestem in order to install customized apps and user interface theme not approved by apply. the virus changes a user's wallpaper to a picture of 1980 pop star Rick astley, and display the world "ikee is never gonna give you up" - a referance to astley's hit song and towns'twitter account. but towns insists the virus is not malicious, will not affect a user's phone permaneently and can be easily arased. instead, he told that the virus was designed in order to exploitt "people' s laziness to change their passwordxd". " somebody with moreb malicious intent could have done any thing - read your SMSs, go thourgh your emailes, view your contact, photos - any thing ," he said . the virus comess after a number of seurity expert intheUS have flagged the ability for hackers to obtain personal information from iphones andd Macs, despite thee company 's marketing stratege that brands its prouducts as virus -free while some have doubted towns' ability to create an iphone virus as severalother hav4ee tried unsuccessfully, he maintain he can prove the authenticity of the virus by publishing its source code.