Popular Websites


SOFTWARE THAT HELP TO RUN A MS OFFICE 10 IN A XP2
http://www.askvg.com/fix-installation-of-microsoft-office-2010-requires-msxml-version-6-10-1129-0/


PTC TESDA TUBIGON
http://www.tesda7.org/ptc-tubigon/contact-us/#wpcf7-f288-p63-o1

FOR BLENDER TUTORIALS
http://www.youtube.com/watch?feature=player_detailpage&v=NbixwwuSY-U

 http://www.youtube.com/watch?feature=player_detailpage&v=U_6kh6hhJN0
For photoshop Tutorials
http://www.youtube.com/watch?v=6L6qAKkBQxc&feature=player_detailpage
 For LOGO EDITOR
http://www.youtube.com/watch?v=IE9DcSDydqg&feature=player_detailpage
http://www.youtube.com/watch?feature=player_detailpage&v=Ngm6EwNiqBs
twilight
http://www.youtube.com/watch?feature=player_detailpage&v=1silawvFgDE

FOR GLOW EFFECTS
http://www.youtube.com/watch?feature=player_detailpage&v=dwuuQ1BhhiE

Software,Movies,Songs and Games free download


http://www.filehippo.com
http://www.4shared.com
http://www.demonoid.me
http://www.torlock.com
http://torrentscan.com
http://www.ahashare.com
http://www.kat.ph/

For Common Networking Terms
http://www.nullmodem.com/terms.htm
http://compnetworking.about.com/

For Movies Subtitles(any languages)

http://subscene.com/

For Os,Printer and More.

for photo color
http://driversdownload.com/http://www.youtube.com/watch?feature=player_detailpage&v=Fsm14uE_gYc

FOR GLOWING PHOTO
http://www.youtube.com/watch?feature=player_detailpage&v=bfS3-cB07P0

EFFECTS
http://www.youtube.com/watch?feature=player_detailpage&v=WrPS7JcSKzc

SOFTWARE GUIDELINESS


Functions

http://www.playtool.com/pages/artifacts/artifacts.html
Profile for Diagnose Video Card.


How to Make My Documents Private on Windows XP


        There are any numbers of reasons why you may wish to make a folder private in Windows XP. You could be on a shared computer without a requirement for a network log in, you may be storing files containing personal or confidential information that you want to keep safe from prying eyes, or you may simply not want other people modifying vital system operation files. Whatever the case, making the My Documents folder private, like securing any other folder, is simply a matter of setting it to be so in the folder's properties.


Instructions


    • 1

Double-click the C drive in "My Computer."

    • 2

Open the "Documents and Settings" folder.

    • 3

Right-click on the folder that corresponds to your user name. Select "Properties" from the sub-menu.

    • 4

Click on the "Sharing" tab. You will see a check box that reads, "Make this folder private so that only I have access to it." Click on the check box. Your My Documents folder is now secure, allowing only you to have access to it when logged in to your window.


How to View a Hidden Partition on Windows XP

A partition is sometimes used to store passwords and important files on a computer. You can also create more space with another partition on your computer. If you have a hidden partition, Windows XP hides it as default. You can unhidden the partition so you will be able to see it on the My Computer or Windows Explorer screens.

Instructions 



1. Click "Start" and "Control Panel."

2.
Click "Folder Options." Click the "View" tab and under the "Advanced Settings" section find "Hidden Files" and "Folder." Choose "Show hidden files and folders." Unchecked "Hide protected operating system files (Recommended.)"
3.
Click "Start" and "My Computer." The partition will now be visible on this screen.




How to block the internet websites by using AVAST ANTI VIRUS:

Instruction:
1. If you have Antivirus like avast, you can easily block the Internet (any websites you want to block). All you have to do is:
2. Click the Avast Icon place in the desktop, all programs or in a taskbar.
3. If it’s already open, click "sitting" above.
4. First click the password, then you can put password, but remember if the you forget the password.You can never change it. The only way to change is your going to format the OS.
5. After you put the password, go to the “ADDITIONAL PROTECTION"
Then click "SITE BLOCKING”, check "ENABLE SITE BLOCKING" enter the "URL".  For example.,www.facebook.com.
6. Finish, the website is already blocking.




terms of  memory

Kibi, mebi, gibi, tebi, pebi, and all that



Also see Kilo, mega, giga, tera, peta, and all that.
Kibi, mebi, gibi, tebi, pebi, and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the International Electrotechnical Commission (IEC) in an effort to eliminate the confusion that sometimes occurs between decimal (power-of-10) and binary (power-of-2) numeration terms.
At present, the prefix multipliers kilo- (k or K), mega- (M), giga- (G), tera- (T), peta- (P), and exa- (E) are ambiguous. In most of the physical sciences, and when describing quantities of objects generally, these multipliers refer to powers of 10. However, when used to define data quantity in terms of bytes, they refer to powers of 2. The following table denotes the most often-used prefixes and their meanings.
PrefixSymbol(s)Power of 10Power of 2
kilo-k or K **103210
mega-M106220
giga-G109230
tera-T

LEARN MORE

1012240
peta-P1015250
exa-E1018 *260
* Not generally used to express data speed
** k = 103 and K = 210

The power-of-10 multipliers and the power-of-2 multipliers for a given word prefix are almost, but not quite, the same. For example, the power-of-10 definition of kilo- (k) refers to 1,000, while the power-of-2 definition (K) refers to 1,024. As if this is not confusing enough, when referring to a data speed of one kilobit per second (1 kbps), analysts generally mean 1,000 bits per second (103 bps), but when talking about one kilobyte (1 KB) of data storage, they usually mean 1,024 bytes (210 B). This prevailing confusion could be eliminated (some computer scientists believe) by adopting special prefixes referring to the binary quantities. The proposed scheme is as follows.
Full technical
name
Proposed
prefix
Proposed
symbol
Numeric
multiplier
kilobinarykibi-Ki210
megabinarymebi-Mi220
gigabinarygibi-Gi230
terabinarytebi-Ti240
petabinarypebi-Pi250
exabinaryexbi-Ei260
In scenarios such as the one mentioned above, if the new binary prefixes are used, it should be easy to know whether an engineer is talking or writing about the decimal or binary multiplier. We will know that one kilobit per second (1 kbps) means 1,000 bps, and one kibibyte (1 KiB) means 1,024 bytes, for example.
As of this writing, the binary prefix multipliers have not yet come into general use.
Pronunciation: Based on a suggestion from NIST, "the first syllable of the name of the binary-multiple prefix should be pronounced in the same way as the first syllable of the name of the corresponding International Standard (SI) prefix, and the second syllable should be pronounced as 'bee.'" Thus, "kibi" would be pronounced "KIH-bee"; "mebi" would be "MEH-bee", and so forth.









Preview


How to Bypass or Remove a BIOS Password

                   A BIOS password is a protection measure that can be used to stop someone powering up a computer system or making changes in some of the computers most sensitive areas. Many big name computer manufacturers such as Dell and HP lock the customers out of this area because they don’t want the customer changing anything and potentially damaging the machine (which the manufacturer may have to warranty). However, when someone like a computer technician or hardware enthusiast needs to make some hardware changes to the computer, they will need to access the BIOS. Here are some methods to bypass or remove a BIOS password.

NOTE: Do not try to guess the password on a pass worded Hard Drive. 3 wrong guesses will often result in the information on the hard drive being lost forever.

How to Bypass or Remove a BIOS Password by Removing the CMOS Battery:

The simplest way to remove a BIOS password is to simply remove the CMOS battery. A computer will remember its settings and keep the time even when it is turned off and unplugged because these parts are powered by small battery inside the computer called a CMOS battery. If we pull out this battery, the computer will forget a lot of its hardware settings, including its BIOS password. This should not be performed on Laptops if you are not experienced working with laptop hardware.
Anyway, open up the computer case using a screw driver and locate the flat, circular and metallic CMOS battery. It should look something like the picture to the right. Some computers have this part standing upright.
Once you have located it, observe how the latches are holding it. There are many different ways to remove a CMOS battery but the most common way on newer computers can be seen in the picture below.
Make sure to power down the computer, unplug the power cables and unplug any USB devices if they are powered. The computer must not be able to get power from anywhere for this to work. Take out the CMOS battery and wait 10 – 25 minutes before putting it back in. The reason for this wait is because the computer can still store power in its capacitors even though everything is unplugged. The waiting period allows enough time for them to discharge.
Plug everything back in, power up the computer and enter the BIOS again. If everything went well there should be no more password. In some cases, if you get weird error messages during boot up now, you will need to go to “Load BIOS Defaults” in BIOS and save the changes to fix them.



How to Bypass or Remove a BIOS Password using the manufacturer backdoor password:

                   On many computers (especially old ones), computer manufacturers build in backdoor passwords for their own technicians to use so they can access the BIOS when the hardware is being serviced. Here are some of the ones that have been reported. You may need to try quite a few passwords before you find one that works
These passwords are Case Sensitive.

AMI BIOS Backdoor Passwords:

A.M.I.                                              AAAMMMII

AMI                                                  AMI?SW

AMI_SW                                          BIOS

CONDO                                            HEWITT RAND

LKWPETER                                       MI
     
Oder                                                  PASSWORD


Award BIOS Backdoor Passwords:
(eight spaces)

01322222                             589589

589721                                 595595

598598                                 ALFAROME
 
ALLY                                      ALLy

aLLY                                     aLLy

aPAf                                     award

AWARD PW                        AWARD SW

AWARD?SW                       AWARD_PW

AWARD_SW                        AWKWARD

Awkward                            IOSTAR

CONCAT                                CONDO
     
Condo                         condo

d8on                           djonet

HLT                             J256

J262                           j262

j322                           j332

J64                               KDD

LKWPETER               Lkwpeter

PINT                         pint
               
SER                            SKY_FOXSYXZ

SKY_FOX                syxz
               
SYXZ                        TTPTHA
ZAAADA                  ZBAAACA
               

ZAAAADA               ZJAAADC                                         

Russian Award BIOS Passwords:
%øåñòü ïpîáåëîâ%           %äåâÿòü ïpîáåëîâ%


Phoenix Backdoor BIOS Passwords:

BIOS                      CMOS

Phoenix                               PHOENIX


Other Manufcaturers Backdoor Passwords: (manufacturer name – password)
VOBIS and IBM – merlin

Dell – Dell
Biostar                        –             Biostar
Compaq                        –         Compaq
Enox                             –           xo11nE
Epox                              –         central
Freetech                       –        Posterie
IWill                              -         iwill
Jetway                        –         spooml
Packard Bell              –     bell9
QDI                             –    QDI
Siemens                     –   SKY_FOX
SOYO                          –  SY_MB
TMC                            –    BIGO
Toshiba                       –  Toshiba







Computer Hardware

Download our free toolbar




The belt in part of  Personal Computer hardware  inside the Casing.











  CPU
          is the abbreviation for central processing unit. It referred  as the central processor, but more commonly called processorthe CPU is the brains of the computer where most calculations take place. In terms of computing power, the CPU is the most important element of a Computer System.
On large machines, the CPU requires one or more printed circuit boards. On personal computers and small workstations, the CPU is housed in a single chip called a microprocessor. Since the 1970's the microprocessor class of CPUs has almost completely overtaken all other CPU implementations.
The CPU itself is an internal component of the computer. Modern CPUs are small and square and contain multiple metallic connectors or pins on the underside. The CPU is inserted directly into a CPU socket, pin side down, on the motherboard.
Each motherboard will support only a specific type (or range) of CPU, so you must check the motherboard manufacturer's specifications before attempting to replace or upgrade a CPU in your computer. Modern CPUs also have an attached heat sink and small fan that go directly on top of the CPU to help dissipate heat.




 The Processor Fan
                     it is prevent the heat of the processor A device that uses motor-driven blades to circulate the air in a computer or other electronic system. Today's CPU's run extremely hot, and large computer cabinets use two and three fans to reduce temperature.








 The complete component of the Personal Computer
         









   A small, portable flash memory card that plugs into a computers USB port and functions as a portable hard drive. USB flash drives are touted as being easy-to-use as they are small enough to be carried in a pocket and can plug into any computer with a USB drive. USB flash drives have less storage capacity than an external hard drive, but they are smaller and more durable because they do not contain any internal moving parts.
USB flash drives are  also called thumb drives, jump drives, pen drives, key drives, tokens, or simply USB drives.


                The hard drive is what stores all your data. It houses the hard disk, where all your files and folders are physically located. A typical hard drive is only slightly larger than your hand, yet can hold over 100 GB of data. The data is stored on a stack of disks that are mounted inside a solid encasement. These disks spin extremely fast (typically at either 5400 or 7200 RPM) so that data can be accessed immediately from anywhere on the drive. The data is stored on the hard drive magnetically, so it stays on the drive even after the power supply is turned off.
The term "hard drive" is actually short for "hard disk drive." The term "hard disk" refers to the actual disks inside the drive. However, all three of these terms are usually seen as referring to the same thing the place where your data is stored. Since the term "hard drive" most often, that is the correct one to use.



 The inside part of the Hard Drive






     The Mother Board is the main circuit board of a microcomputer. The motherboard contains the connectors for attaching additional boards. Typically, the motherboard contains the CPU, BIOS, memory, mass storage interfaces, serial and parallel ports, expansion slots, and all the controllers required to control standard peripheral devices, such as the display screen, keyboard, and disk drive. Collectively, all these chips that reside on the motherboard are known as the motherboard's chip set.
On most PCs, it is possible to add memory chips directly to the motherboard. You may also be able to upgrade to a faster PC by replacing the CPU chip. To add additional core features, you may need to replace the motherboard entirely.





               Computer power Supply is Also called a power supply unit or PSU, the component that supplies power to a computer. Most personal computers can be plugged into standard electrical outlets. The power supply then pulls the required amount of electricity and converts the AC current to DC current. It also regulates the voltage to eliminate spikes and surges common in most electrical systems. Not all power supplies, however, do an adequate voltage-regulation job, so a computer is always susceptible to large voltage fluctuations.
Power supplies are rated in terms of the number of watts they generate. The more powerful the computer, the more watts it can provide to components.




The main Part of the component that attach in the motherboard.














 Random Access Memory (RAM)

        provides space for your computer to read and write data to be accessed by the CPU (central processing unit). When people refer to a computer's memory, they usually mean its RAM.
If you add more RAM to your computer, you reduce the number of times your CPU must read data from your hard disk. This usually allows your computer to work considerably faster, as RAM is many times faster than a hard disk.
RAM is volatile, so data stored in RAM stays there only as long as your computer is running. As soon as you turn the computer off, the data stored in RAM disappears.
When you turn your computer on again, your computer's boot firmware (called BIOS on a PC) uses instructions stored semi-permanently in ROM chips to read your operating system and related files from the disk and load them back into RAM.


      TYPE OF RAM

SDR - Single Data Rate

           Stands for "Synchronous Dynamic Random Access Memory."  it's a mouthful.SDRAM is an improvement to standard DRAM because it retrieves data alternately between two sets of memory. This eliminates the delay caused when one bank of memory addresses is shut down while another is prepared for reading.
It is called "Synchronous" DRAM because the memory is synchronized with the clock speed that the computer's CPU bus speed is optimized for. The faster the bus speed, the faster the SDRAM can be. SDRAM speed is measured in Megahertz, which makes it easy to compare the processor's bus speed to the speed of the memory.
DDR- Double Data Rate


                Double-Data-Rate Synchronous Dynamic Random Access Memory, better known as DDR SDRAM or DDR RAM for short, is a type of very fast computer memory. DDR RAM is based on the same architecture as SDRAM, but utilizes the clock signal differently to transfer twice the data in the same amount of time.
      In a computer system, the clock signal is an oscillating frequency used to coordinate interaction between digital circuits. Simply put, it synchronizes communication. Digital circuits designed to operate on the clock signal may respond at the rising or falling edge of the signal. SDRAM memory chips utilized only the rising edge of the signal to transfer data, while DDR RAM transfers data on both the rising and falling edges of the clock signal. Hence,DDR RAM is essentially twice as fast as SDRAM.
      RAM speed works in conjunction with the front side bus (FSB) of a computer system. The FSB is the two-way data channel that sends information from the central processing unit (CPU) throughout the motherboard to the various components, including the RAMBIOS chips, hard drives and PCI slots. Therefore, a computer system with a FSB of 133MHz running DDR SDRAM will essentially perform like a 266MHz machine.
DDR2-
          Stands for "Double Data Rate 2." DDR2 RAM is an improved version of DDR memory that is faster and more efficient. Like standard DDR memory, DDR2 memory can send data on both the rising and falling edges of the processor's clock cycles. This nearly doubles the amount of work the RAM can do in a given amount of time. DDR and DDR2 are also both types of SDRAM, which allows them to run faster than conventional memory. 

While DDR and DDR2 have many similarities, DDR2 RAM uses a different design than DDR memory. The improved design allows DDR2 RAM to run faster than standard DDR memory. The modified design also gives the RAM more bandwidth, which means more data can be passed through the RAM chip at one time. This increases the efficiency of the memory. Since DDR2 runs more efficiently than standard DDR memory, it actually uses less power than DDR memory, even though it runs faster. The only downside of DDR2 memory is that it is not compatible with standard DDR slots. So make sure your computer supports DDR2 RAM before upgrading your memory.webopedia.com



DDR3

           DDR3 SDRAM, an abbreviation for double data rate type three synchronous dynamic random access memory, is a modern kind of dynamic random access memory (DRAM) with a high bandwidth interface. It is one of several variants of DRAM and associated interface techniques used since the early 1970s. DDR3 SDRAM is neither forward nor backward compatible with any earlier type of random access memory (RAM) due to different signaling voltages, timings, and other factors.
DDR3 is a DRAM interface specification. The actual DRAM arrays that store the data are similar to earlier types, with similar performance.wiseGEEK.com
The primary benefit of DDR3 SDRAM over its immediate predecessor, DDR2 SDRAM, is its ability to transfer data at twice the rate (eight times the speed of its internal memory arrays), enabling higher bandwidth or peak data rates. With two transfers per cycle of a quadrupled clock, a 64-bit wide DDR3 module may achieve a transfer rate of up to 64 times the memory clock speed in megabytes per second (MB/s). With data being transferred 64 bits at a time per memory module, DDR3 SDRAM gives a transfer rate of (memory clock rate) × 4 (for bus clock multiplier) × 2 (for data rate) × 64 (number of bits transferred) / 8 (number of bits/byte). Thus with a memory clock frequency of 100 MHz, DDR3 SDRAM gives a maximum transfer rate of 6400 MB/s. In addition, the DDR3 standard permits chip capacities of up to gigabytes.
wikipedia.com      

peripheral device

        computer device, such as a CD-ROM drive or printer is not part of the essential computer. The memory and microprocessor. Peripheral devices can be external such as a mousekeyboardprintermonitor, external Zip drive or scanner or internal, such as a CD-ROM driveCD-R drive or internal modem. Internal peripheral devices are often referred to as integrated peripherals