Saturday, November 10, 2007



Lets say you have about 4-5 very useful applications which you use always.
By placing them all on the first level menu will eventually crowd your start menu. Now why not utilize the right-click option instead? The right-click option gives you the ability to Open, Explore and Find. If you can add a shortcut to your application to that menu, it would be great.
To do this, crank up your registry editor and go to HKEY_CLASSES_ROOT\Directory\Shell. Right-click on Shell and create a new key. Type in an appropriate name for the key. On the right pane, double-click on the Default value, and add a title with a & character in front of the letter as an accelerator key. Right-click on the key you just created and create another key under it called command . For the Default value of command, enter the full path and program you want to execute in the Value data box.
For example, if you wanted Notepad, you would add that as the first key, the default in the right panel would be &Notepad so when you right click on the Start Button, the N would be underlined and you could just press that key. The command would be something like C:\Windows\notepad.exe. Now when you right click on the Start Button, your new program will show up.
Already existing shortcuts are

Windows key = Displays taskbar and Start menu

Windows key + D = Moves to desktop

Windows key + E = Starts Windows Explorer

Windows key + F = Finds files or folders

Windows key + CTRL + F = Finds a computer

Windows key+L =Locks the screen.


Windows key + M = Minimizes all windows

Windows key + Shift + M = Undoes minimize all windows

Windows key + R = Displays the Run dialog box

Windows key + Tab = Cycles through the taskbar buttons

Windows key + Break = Displays the System Properties sheet

I have already posted on renaming the recycle bin.

Here I have posted on adding more features to the recycle bin!!
The Recycle Bin is a funny thing - it has a lot of limitations compared to other normal icon. But I discovered that you can do all sorts of weird things with the context menu. This tip will only show you how to fool around with the context menu of the icon and and appearance of the icon. What you can do with it I am not so sure...


Open up the registry editor and go to HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\ShellFolder.

Add Rename to the menu, change Attributes to 50 01 00 20
Add Delete to the menu, change Attributes to 60 01 00 20
Add both Renamme & Delete to the menu, change Attributes to 70,01,00,20
Restore the Recycle Bin to Windows defaults including un-deleting the icon after deletion, go to
To Restore the icon, go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA002F954E} and add a key named Recycle Bin
To reset Windows defaults, go to HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\ShellFolder and change Attributes to 40 01 00 20
And some more practically useless edits to the context menu go to HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\ShellFolder
Add Copy to the menu, change Attributes to 41 01 00 20
Add Cut to the menu, change Attributes to 42 01 00 20
Add Copy & Cut to the menu, change Attributes to 43 01 00 20
Add Paste to the menu, change Attributes to 44 01 00 20
Add Copy & Paste to the menu, change Attributes to 45 01 00 20
Add Cut & Paste to the menu, change Attributes to 46 01 00 20
Add all Cut, Copy & Paste to the menu, change Attributes to 47 01 00 20

The above edits are more to the fun side than useful but the Rename & Delete can be quite useful sometimes. You don't have to worry about deleting it since you can always call it back.

Friday, November 9, 2007

A desktop computer equipped with a CD writer or a DVD burner is a rare sight is most companies. But a much larger security threat is pose by the open USB ports where mischievous office workers can just plugin the Flash Pen Drive, External Hard Disk or their iPod music player and transfer corporate data or even copy licensed software to their memory sticks in seconds.

Also, USB keys are not just a popular way to sneak data out from companies, unhappy employees may use USB ports for delivering trojans or spyware into the company networks.
Now some smart admins disable usb drive by changing the BIOS settings and then lock the BIOS using passwords. Some not so-smart admins fix tapes over the USB ports to prevent employees from inserting any USB device into their computer.

However, both these approaches can prove to be counter-productives as your staff can no longer use USB keyboards, wireless mouse, digital cameras, camcorders, scanners, printers or even USB microphones to their computers.

So a more reasonable option for sysadmins is to disable write access to USB port so that data files cannot be written to the mass storage device. The USB thumb drive will be read-only.

Open the Windows Registry and open the following key
HKEY_LOCAL_MACHINE\System\CurrentControlSet\ Control\StorageDevicePolicies

Now add a new DWORD called WriteProtect and put the value as 0 to disable write privileges to the USB port. To reverse the step, either delete the WriteProtect REG_DWORD or toggle the value to 1 which will enable the port.

Remember that the above trick works only with Windows XP SP2.

If you like to go a step further and disable users from connecting USB storage devices to their computers, here's the trick:

Open registry and navigate to the following registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet \Services\UsbStor

Now in the right pane, double-click Start and type 4 in the Value data box (Hexadecimal) and quite the registry editor. To enable the USB storage devices, change the Start value back to 3.

No matter how good the protection tricks are, determined people always find workarounds. Here are some of the tricks that may render the above methods unusable:

» Employee may boot computer using a LiveCD like Knoppix or Ubuntu so the USB drives are again available to him for writing.

» They could open the computer chasis, take the battery out to reset the BIOS settings.

» Some may even invest in a PS2 to USB port converter.

» If he manages to get admin access for a temporary period (like installing software), he may undo the registry edits.

The cat-mouse game will never end. USB drives will remain a headache for the sysadmins for some time. However, Windows Vista will make life much simpler for IT administrators. There's a new Policy in Vista that allows USB keyboards or mouse to be used but not any USB devices.

Tuesday, November 6, 2007

Here’s another energy saving device. This clock runs on, wait for it…water! The clock uses a patented water powered battery, which only needs topping up with h20 once every 2-3 months. The clock displays the time and date, however if you turn it 90 degrees it will display the temperature (Celsius and Fahrenheit), turn it again and the alarm will be displayed and finally with one more 90 degree turn the timer is displayed.





Available at GadgetShop.com

Monday, November 5, 2007

How Google Works

After a long time I have made a big post.
This post demanded that size....
If you aren’t interested in learning how Google creates the index and the database of documents that it accesses when processing a query, skip this description.

Google runs on a distributed network of thousands of low-cost computers and can therefore carry out fast parallel processing. Parallel processing is a method of computation in which many calculations can be performed simultaneously, significantly speeding up data processing. Google has three distinct parts:

Googlebot, a web crawler that finds and fetches web pages.

The indexer that sorts every word on every page and stores the resulting index of words in a huge database.

The query processor, which compares your search query to the index and recommends the documents that it considers most relevant.
Let’s take a closer look at each part.

1. Googlebot, Google’s Web Crawler

Googlebot is Google’s web crawling robot, which finds and retrieves pages on the web and hands them off to the Google indexer. It’s easy to imagine Googlebot as a little spider scurrying across the strands of cyberspace, but in reality Googlebot doesn’t traverse the web at all. It functions much like your web browser, by sending a request to a web server for a web page, downloading the entire page, then handing it off to Google’s indexer.
Googlebot consists of many computers requesting and fetching pages much more quickly than you can with your web browser. In fact, Googlebot can request thousands of different pages simultaneously. To avoid overwhelming web servers, or crowding out requests from human users, Googlebot deliberately makes requests of each individual web server more slowly than it’s capable of doing.

Googlebot finds pages in two ways: through an add URL form, www.google.com/addurl.html, and through finding links by crawling the web.



Unfortunately, spammers figured out how to create automated bots that bombarded the add URL form with millions of URLs pointing to commercial propaganda. Google rejects those URLs submitted through its Add URL form that it suspects are trying to deceive users by employing tactics such as including hidden text or links on a page, stuffing a page with irrelevant words, cloaking (aka bait and switch), using sneaky redirects, creating doorways, domains, or sub-domains with substantially similar content, sending automated queries to Google, and linking to bad neighbors. So now the Add URL form also has a test: it displays some squiggly letters designed to fool automated “letter-guessers”; it asks you to enter the letters you see — something like an eye-chart test to stop spambots.

When Googlebot fetches a page, it culls all the links appearing on the page and adds them to a queue for subsequent crawling. Googlebot tends to encounter little spam because most web authors link only to what they believe are high-quality pages. By harvesting links from every page it encounters, Googlebot can quickly build a list of links that can cover broad reaches of the web. This technique, known as deep crawling, also allows Googlebot to probe deep within individual sites. Because of their massive scale, deep crawls can reach almost every page in the web. Because the web is vast, this can take some time, so some pages may be crawled only once a month.

Although its function is simple, Googlebot must be programmed to handle several challenges. First, since Googlebot sends out simultaneous requests for thousands of pages, the queue of “visit soon” URLs must be constantly examined and compared with URLs already in Google’s index. Duplicates in the queue must be eliminated to prevent Googlebot from fetching the same page again. Googlebot must determine how often to revisit a page. On the one hand, it’s a waste of resources to re-index an unchanged page. On the other hand, Google wants to re-index changed pages to deliver up-to-date results.

To keep the index current, Google continuously recrawls popular frequently changing web pages at a rate roughly proportional to how often the pages change. Such crawls keep an index current and are known as fresh crawls. Newspaper pages are downloaded daily, pages with stock quotes are downloaded much more frequently. Of course, fresh crawls return fewer pages than the deep crawl. The combination of the two types of crawls allows Google to both make efficient use of its resources and keep its index reasonably current.

2. Google’s Indexer

Googlebot gives the indexer the full text of the pages it finds. These pages are stored in Google’s index database. This index is sorted alphabetically by search term, with each index entry storing a list of documents in which the term appears and the location within the text where it occurs. This data structure allows rapid access to documents that contain user query terms.
To improve search performance, Google ignores (doesn’t index) common words called stop words (such as the, is, on, or, of, how, why, as well as certain single digits and single letters). Stop words are so common that they do little to narrow a search, and therefore they can safely be discarded. The indexer also ignores some punctuation and multiple spaces, as well as converting all letters to lowercase, to improve Google’s performance.

3. Google’s Query Processor

The query processor has several parts, including the user interface (search box), the “engine” that evaluates queries and matches them to relevant documents, and the results formatter.
PageRank is Google’s system for ranking web pages. A page with a higher PageRank is deemed more important and is more likely to be listed above a page with a lower PageRank.
Google considers over a hundred factors in computing a PageRank and determining which documents are most relevant to a query, including the popularity of the page, the position and size of the search terms within the page, and the proximity of the search terms to one another on the page.
Google also applies machine-learning techniques to improve its performance automatically by learning relationships and associations within the stored data. For example, the spelling-correcting system uses such techniques to figure out likely alternative spellings. Google closely guards the formulas it uses to calculate relevance; they’re tweaked to improve quality and performance, and to outwit the latest devious techniques used by spammers.
Indexing the full text of the web allows Google to go beyond simply matching single search terms. Google gives more priority to pages that have search terms near each other and in the same order as the query. Google can also match multi-word phrases and sentences. Since Google indexes HTML code in addition to the text on the page, users can restrict searches on the basis of where query words appear, e.g., in the title, in the URL, in the body, and in links to the page, options offered by Google’s Advanced Search Form and Using Search Operators (Advanced Operators).

Let’s see how Google processes a query.



Itz really interesting.
Hope you find it the same too!!!

Sunday, November 4, 2007

You know that the human race is getting increasingly lazy,when we cant even be bothered opening the trash can lid to put trash in anymore. But, thats essentially what this gadget achieves. However, it does have itz perks besides removing the need to bend over and lift a lid. Using invisible infrared technology, the iTouchless trash can automatically opens when you put your hand or debris about six inches away from the lid. Once your hands have moved away and debris has been released the lid automatically closes.
The main advantage of this technology is it means you don’t have to come in contact with any germs when you need to dispose of waste, be it when cooking, or playing with your children.


The trashcan runs on four “D” size heavy duty batteries and supports up to 10,000 consecutive openings and closings.
If you are interested....
You can grab one from Amazon for $74.00.

Code converter

The code converters are very rare.And this code converter converts C# code to VB.NET and vice versa.It is an excellent code converter tool.My dream project is an all language code converter.When I saw this i felt very interested.Check it out.Type some code,Convert and verify!!!!


Check it out!!!

Saturday, November 3, 2007

You would have seen google earth!
Similarly if you have a software to see the Internet?
what if the whole internet is made into a small pic and we zoom into it?
Someone has thought so.
And developed Web 3.0,a new technology.
This video is on that technology!!!
If you see the video,you would be awed with the power of that software,named see dragon!!

Web 3.0 is a term that is used to describe various evolution of Web usage and interaction along several separate paths. These include transforming the Web into a database, a move towards making content accessible by multiple non-browser applications, the leveraging of artificial intelligence technologies, the Semantic web, the Geospatial Web, or the 3D web. More often it is used as a marketing ploy to hype incremental improvements of Web 2.0....

Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags.

An RFID tag is an object that can be applied to or incorporated into a product, animal, or person for the purpose of identification using radiowaves. Some tags can be read from several meters away and beyond the line of sight of the reader.

Most RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a (RF) signal and can also be used for other specialized functions. The second is an antenna for receiving and transmitting the signal. A technology called chipless RFID allows for discrete identification of tags without an integrated circuit, thereby allowing tags to be printed directly onto assets at lower cost than traditional tags.