Wednesday, February 29, 2012

गूगल क्रोम के लिए फ्री विडियो डाउनलोडर ।

अगर आप गूगल क्रोम का इस्तेमाल करते हैं तो आप के गूगल क्रोम के लिए एक बहुत अच्छा एक्सटेंशन जिसकी सहयेता से आप किसी भी वेबसाइट से विडियो बहुत आसानी से डाउनलोड कर सकते हैं   
ये एक्सटेंशन सिर्फ 48 kb का है और वो भी फ्री । 


मोज़िला का पोर्टेबल वर्सन |

आप के कंप्यूटर के लिए मोज़िला का पोर्टेबल वर्सन इस सॉफ्टवेर को इन्सटाल करने की ज़रूरत नहीं है ।
डाउनलोड कीजिये और इस्तेमाल शुरू इंस्टाल करने की कोई जरुरत नहीं है ।पोर्टेबल सॉफ्टवेर के इस्तेमाल से कंप्यूटर के मेमोरी की भी बचत होती है ।


HOW TO RECOVER YOUR HACKED EMAIL ACCOUNT

HOW TO RECOVER YOUR HACKED EMAIL ACCOUNT


Gmail

Today in this post I’ll teach you how to recover your hacked Email account. It is a big disaster if someone hacks your email account and takes control of your email account .As your email account may contain the confidential records and data like internet banking user name, password, credit card details and other sensitive data. If your email account has been hacked and you want it again, then this new trick will surely help you out. In this web trick you will find the possible ways and procedures to get back your hacked email account.
For Gmail Account:

If your Gmail account has been hacked then it would be a big disaster for you as your Gmail account may be associated with several services like “Facebook”, “Blogger”, “Analytics”,” Ad words”, “Ad sense”, “Orkut” etc. When you Lose your access to your Gmail account it means you are losing access to all the services associated with it. Now check out the following new trick to recover your Gmail:
Step -1: First of all try to reset your password. It is the easiest method to get back your Gmail account. For performing this trick Google may ask you to answer the “secret question “that you fill in the form during the creation of your Gmail account or may send the password reset details to the secondary email address associated with your hacked account. 



If the first method does not works for you then choose the second trick given below: 
Step-2: Sometime when the hacker hacks your account they recently change yoursecret question and secondary email address. And your first trick will not work as discussed above. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. The recovery form consists of various question and you have to answer each question accuratly so that your account get recover easily. The various type of question in the form are:
1. Last five emailed addresses on which you send email.
2. Other services associated with your Hacked account
3. Last successful Login  date.
4. Account creation date.
5. Last password that you remember and many more questions…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance to recover your account! The more accurate the information filled out in the recovery form, the more the chances of getting your account back.


ppLEASEE  FOLLOW  this blog and ADD COMMENT IF U HAV ANY PROBLEM                            PLEASEEEE SHARE  THIS BLOG ON FACEBOOK  / GOOGLE+        IF U LIKE IT     AADISH





Tuesday, February 28, 2012

क्या आप जानते है की दुनिया का सबसे अमीर देश कौन है ?

अगर आप अमेरिका या किसी यूरोपीय देश के बारे में सोच रहें तो आप बिल्कुल गलत हैं। फोर्ब्स की ताजा लिस्ट के मुताबिक दुनिया का सबसे रईस देश कतर बन गया है। अमेरिकी बिजनेस पत्रिका फोर्ब्स के मुताबिक यह खाड़ी देश अपने प्राकृतिक संसाधनों की वजह से इस मुकाम पर पहुंचा है।
फोटो गूगल से लिया गया है
फोर्ब्स के मुताबिक साल 2010 में यहा प्रति व्यक्ति आय 88,000 डॉलर थी। जबकि दूसरे नंबर पर लग्जमबर्ग 81,000 डॉलर प्रति व्यक्ति आय के साथ कब्जा जमाए है। 56,700 डॉलर प्रति व्यक्ति आय के साथ सिंगापुर तीसरे और नार्वे, ब्रूनेई क्रमश चौथे और पांचवे स्थान पर काबिज है। एक और खाड़ी देश संयुक्त अरब अमीरात 47,500 डॉलर प्रति व्यक्ति आय के साथ छठें स्थान पर है जबकि कुवैंत 15वें स्थान पर है।


ये पोस्ट दैनिक भास्कर से लिया गया है जिसका मकसद जानकारी को दुसरो के साथ बाटना है न की कोई आर्थिक लाभ उठाना। पूरा खबर पढने के लिए यहाँ क्लिक करें।  

Monday, February 27, 2012

Cara Membuat Akun di Youtube


Banyak artis pendatang baru tenar gara-gara Youtube, ketenaran mereka hanya karena ulah iseng mereka yang melakukan unggah video mereka ke Youtube dan ditonton oleh banyak orang sehingga mereka menjadi orang terkenal secara mendadak. Apakah anda juga ingin menjadi terkenal seperti Norman Camaru dari Sulawesi yang dulunya personil Polisi kini meninggalkan kesatuannya dan memilih menjadi penyanyi,

Sunday, February 26, 2012

how to create standout best facebook timeline cover




Most of facebook user's now have facebook timeline profile some likes it some don't but the fact is we all have to leave with it. Personally i like Facebook timeline it changed the experience of profile now your profile really express you. and the best thing about timeline is it gives you option to select a COVER cover to your timeline. Timeline cover is a stand out feature. It gives you opportunity to express your personality.

So In this post we will discuss about how one can create a standout, cool and best timeline covers with a cool facebook app Cover Canvas with just one click.


 


  • Just Login to your facebook account 
  • then goto Cover Canvas and click on Get Started
  • Click on Allow 
  • Now choose a cover you like.
  • And click on Make My Cover
  • Now goto your facebook timeline and change your timeline cover 


Cara Membuka File .docx Tanpa MS Office 2007 Keatas


Dengan semakin banyak pemakai Microsoft Word 2007, kita semakin sering jumpai file format .docx. File ini merupakan standar baru untuk file dari Microsoft Office yang dikenal sebagai OOXML atau OpenXML. Sehingga ketika kita ingin membuka, mengedit, atau membacanya diperlukan Office 2007 ke atas. Tetapi bagaimana kalau kita berada di warnet atau di komputer kawan yang tidak ada Office 2007?

[Review] Light Downloader

Secara teori, hampir semua aplikasi download manager memiliki fungsi yang sama. Kemampuannya dibuat agar Anda bisa melakukan proses unduh berkas dari suatu situs lebih cepat dengan tingkat keberhasilan yang lebih tinggi. Feature-nya pun mirip, mulai dari proses akselerasi, pause, resume, dan schedule. Namun, aplikasi ini tidak dikhususkan untuk mengunduh kandungan multimedia dari situs streaming

Saturday, February 25, 2012

INCREASE COMPUTER SPEED BY CLEANING R.A.M


CLEAN YOUR RAM BY USING THIS PC TRICKS

  
Nice one PC Trick to clean up your RAM for high processing speed. For performing this PC trick there is no need of any software .This PC Tricks is easily performed by using NOTEPAD .The PC Trick has the following steps:
1).First of all for this pc tricks create a new text file on ur desktop and Name it as "RAM cleaner" or something else.
2).Now the next step for this pc tricks is to Type the following lines in the text document.

Free Mem =Space(64000000)

Then save it as RAM cleaner .vbs [ You may choose the "All Files" option when you save it ]
3).Now you will saw a new executable  file on the screen named as RAM Cleaner. For this PC trick to perform run the file and your RAM gets cleaned up.

One more thing i want to introduce in this pc tricks is that you can edit the code in the file for a greater  cleaning-progress. For example: Freemem=Space (1280000000).

That’s all about this pc trick. For more PC Tricks continuously visit on this site.

ppLEASEE  FOLLOW  this blog and ADD COMMENT IF U HAV ANY PROBLEM                            PLEASEEEE SHARE  THIS BLOG ON FACEBOOK  / GOOGLE+        IF U LIKE IT     AADISH










Cara Mengecek Online "Cukupkah?" Spesifikasi Hardware Anda Untuk Sebuah Game

Sebelumnya saya sering sekali mendapat pertanyaan, "Apakah komputer saya kuat untuk bermain GTA 4 ini spesifikasinya.............................." karena terbatasnya pengetahuan penulis terhadap Gaming, saya punya solusi untuk kalian yang bingung untuk memilih milih game. Langsung saja, kita akan mengecek apakah komputer yang kita gunakan Support dan mendukung game yang sudah kita beli. Cara ini

Thursday, February 23, 2012

PC TRICK TO LOCK YOUR COMPUTER BY CREATING DESKTOP SHORTCUT.


PC TRICK TO LOCK YOUR COMPUTER BY CREATING DESKTOP SHORTCUT.

If you use your computer in an area where others may have access to it, and there are some confidential data  on your system and you  want that your data remain secure then apply this PC trick.Locking your desktop when you leave the PC is an essential task that task you can perform by various PC Tricks but this one PC trick is very easy to perform. The following are the step to perform this pc trick for a creation of desktop shortcut that will lock your computer in two easy clicks:


1). Right click on an empty area of the desktop and choose 'NEW' option  then 'SHORTCUT'. 


2).Now the  shortcut wizard will open; in the first text box, type '%windir%\System32\rundll32.exe user32.dll    ‘

 ’,as shown below...




 3). Then the next step for this PC Trick is give your shortcut an appropriate name on the next page, and hit 'finish.'
4).You will notice that the shortcut you created has a blank icon. To select a more appropriate one, right click on the shortcut and hit 'PROPERTIES' In the 'shortcut' tab, click the 'change icon' button as shown in screen shot.


5).In the 'look for icons in this file' box you have to type '%SystemRoot%\system32\SHELL32.dll' as shown below then click 'ok' .




PC Trick for desktop locking with a shotcut is now ready for use. Test it out. and run it 




ppLEASEE
  FOLLOW  this blog and ADD COMMENT IF U HAV ANY PROBLEM                            PLEASEEEE SHARE  THIS BLOG ON FACEBOOK  / GOOGLE+        IF U LIKE IT     AADISH












Wednesday, February 22, 2012

Microsoft Perpanjang Dukungan Windows Vista & Windows 7

Baru-baru ini Microsoft mengumumkan akan memperpanjang dukungan terhadap sistem operasi mereka hingga 5 tahun kedepan. Dukungan ini berlaku pada Windows Vista dan 7 semua edisi dengan menggunakan service pack terbaru.

Sebelumnya Microsot telah berkomitmen bahwa dukungan security updates maupun hotfixes hanya akan dilakukan selama lima tahun kedepan terhitung setahun setelah dirilisnya

Melihat Spesifikasi Komputer Dengan CPU-Z Dan GPU-Z

Bagi orang awam terkadang kita merasa bingung dengan spesifikasi komputer yang kita punya. Apa jenis procesornya ? Apakah dual core ? Berapa speednya ? Apa nama & merk motherboard ? Berapa memory yang terpasang apakah jenis DDR1/DDR2/DDD3 ? Apa jenis vga card yang terpasang ? Mungkin kita akan mencari jawabnya dengan membuka casing (penutup) komputer kita. Tapi sebenarnya ada cara yang lebih

Tuesday, February 21, 2012

LOG IN in XP WITHOUT KNOWING PASSWORD



LOG IN in XP WITHOUT KNOWING PASSWORD


hey frnds. many of u know this but still 4 those who are not aware of this trick...

if u forgot password or want to log on in others computer just follow this trick....

works 100percent in xp ...don't know abt. other O.S.
the tric follows---
1) start computer
2) when it asks for password press ctrl+alt+delete keys twice
3) now another window opens asking for password.
4) in this at the place of user name just type administrator....leave the password feild blank and hit enter
5)wow u have logged in as a normal user
6) now u hav full authority only problem is that u can't open my document of the original account.
6) don't worry abt. this just use any file recovery softwere and move the files from acess denied my document to any other folder(in other drive)

enjoy



ppLEASEE  FOLLOW  this blog and ADD COMMENT IF U HAV ANY PROBLEM                            PLEASEEEE SHARE  THIS BLOG ON FACEBOOK  / GOOGLE+        IF U LIKE IT     AADISH







Tips Trik Menjaga Dan Merawat Printer

  Sebenarnya tidak ada yang istimewa dalam tips perawatan printer atau cara merawat printer. Namun kalau hal itu kita lakukan dengan benar akan sangat berpengaruh terhadap kinerja dan usia pakai printer kita. Berikut ini saya share tips perawatan printer atau cara merawat printer sesuai pengalaman pribadi saya, khususnya Inkjet printer yaitu yang menggunakan Tinta Cair :
Gunakan printer

Konsep Dan Cara Kerja PHP

Konsep atau cara kerja HTML itu sangat sederhana, yaitu berawal dari client yang memanggil berdasarkan URL (Uniform Resource Locator) melalui browser, kemudian browser mendapat alamat dari web server, yang nantinya akan memberikan segala informasi yang dibutuhkan web browser. Web browser yang sudah mendapat informasi segera melakukan proses penterjemahan kode HTML dan menampilkannya ke layar

Tutorial Membuat File PDF Dengan Ms Office Dan Program Lainnya

Teman-teman mungkin sudah tak asing lagi dengan file PDF.  file yang dibukanya menggunakan Adobe Reader  ataupun Foxit Reader. Biasanya file dengan format PDF ini bisa kita temukan digunakan pada :


E-Book, 
Petunjuk (manual) bawaan pada software ataupun driver,
Surat lamaran (application) via E-mail, 
Surat - surat berharga yang di-scan kemudian dijadikan bentuk PDF, 
Jurnal ilmiah online dan

Monday, February 20, 2012

किसी भी फाइल या सॉफ्टवेर को ऑन-लाइन एस्केन करें।

आप ने इन्टरनेट से कोई फाइल डाउनलोड किया या फिर अपने किसी दोस्त से कोई फाइल या सॉफ्टवेर कॉपी किये है और आप को शक है की वो फाइल या सॉफ्टवेर आप के कंप्यूटर के लिए हानिकारक है लेकिन वो फाइल या सॉफ्टवेर आप के लिए ज़रूरी भी है तो आप उस फाइल या सॉफ्टवेर को ऑन-लाइन एस्केन कर के इस बात को जाच सकते है की आप के द्वारा डाउनलोड किया गया या दोस्त से लिया गया फाइल और सॉफ्टवेर सुरक्षित है या नहीं।
Virustotal नाम के वेबसाइट के द्वारा आप किसी भी फाइल या सॉफ्टवेर को जाच सकते है की वो सुरक्षित है या नहीं ?
 

How to find senders IP address from received mail



How to find senders IP address from 


received mail







E-mails   are very important part of our communication system
We think that we know everything about emails
we know how to compose email , how to attach a file , how to send it to others ,How to receive emails from others and many other things.This is all we know about emails.But this is not end of it .When you receive or send emails many other things are sent with it.
At this time when Email is progressively used for business and for many purposes, not to mention it is being used for phishing and other malicious intentions. It is of utmost priority to understand the other “messages” besides what has been sent or received by you.
Every email comes with a “Header” which is one part of an e-mail structure; call it DNA of the mail. It carries the basic fundamental information such as from whom the email comes, to whom it is addressed, date/time it was sent and the subject of the email. It is similar to an electronic postSeptemberk. Moreover, it also carries other detailed information which we usually don’t see.
This basic information comes in all brief/basic headers that most email programs automatically shows. This detail technical information can be viewed in a full header. All email programs can be set to show only brief header or full header and it is up to the users to set the program whether to view only “brief header” or “full header”.
Full header carries the information of the mail server’s name that the email passed through on its way to the recipient, and sender’s IP address and even the name of the email program and its version used.
Knowledge of this information is essential for analysis and investigation purposes on cases involving email abuse, spamming, harassment, forgeries and mail-bombing. It is worth mentioning, understanding of this tool would definitely help people to counter these attacks, and save themselves from unwarranted consequences. Well, this information could not be found in a brief header.
Here we will take the case of Google mail and Yahoo mail to find out the full header.
Google Mail.
Using your id/password, login to Gmail. Open the mail for which you wish to find the full header of the sender. Click on the inverted triangle placed just next to Reply.
You will get something like this…
Delivered-To: Mr.x@gmail.com
Received: by 10.36.81.3 with SMTP id e3cs239nzb; Tue, 12 September 2007 15:11:47 -0800 (PST)
Return-Path:
Received: from mail.emailprovider.com (mail.emailprovider.com [111.111.11.111]) by mx.gmail.com with SMTP id h19si826631rnb.2007.03.12.15.11.46; Tue, 12 September 2007 15:11:47 -0800 (PST)
Message-ID: <20070312231145.62086.mail@mail.emailprovider.com>
Received: from [11.11.111.111] by mail.emailprovider.com via HTTP; Tue, 12 September 2007 15:11:45 PST
Date: Tue, 12 September 2007 15:11:45 -0800 (PST)
From: Mr.y
Subject: Hello
To: Mr.x
In the example, headers are added to the message three times:

1. When Mr.y composes the email
Date: Tue, 12 September 2007 15:11:45 -0800 (PST)
From: Mr .y
Subject: Hello
To: Mr.x
2. When the email is sent through the servers of Mr.y’s email provider, mail.emailprovider.com
Message-ID: <20070312231145.62086.mail@mail.emailprovider.com>
Received: from [11.11.111.111] by mail.emailprovider.com via HTTP; Tue, 12 September 2007 15:11:45 PST
3.When the message transfers from Mr.y ‘s email provider to Mr. x’s Gmail account
Delivered-To: Mr.x@gmail.com
Received: by 10.36.81.3 with SMTP id e3cs239nzb;Tue, 12 September 2007 15:11:47 -0800 (PST)
Return-Path: Mr.y@emailprovider.com
Received: from mail.emailprovider.com (mail.emailprovider.com [111.111.11.111]) by mx.gmail.com with SMTP id h19si826631rnb; Tue, 12 September 2007 15:11:47 -0800 (PST)
Below is a description of each section of the email header:
Delivered-To: Mr.x@gmail.com
The email address the message will be delivered to.
Received: by 10.36.81.3 with SMTP id e3cs239nzb;
Tue, 29 Mar 2005 15:11:47 -0800 (PST)
The time the message reached Gmail’s servers.
Return-Path:
The address from which the message was sent.
Received: from mail.emailprovider.com
(mail.emailprovider.com [111.111.11.111])
by mx.gmail.com with SMTP id h19si826631rnb.2005.03.29.15.11.46;
Tue, 29 Mar 2005 15:11:47 -0800 (PST)
The message was received from mail.emailprovider.com, by a Gmail server on March 29, 2005 at approximately 3 pm.
Message-ID: 20050329231145.62086.mail@mail.emailprovider.com
A unique number assigned by mail.emailprovider.com to identify the message.
Received: from [11.11.111.111] by mail.emailprovider.com via HTTP; Tue, 29 Mar 2005 15:11:45 PST
Mr.y used an email composition program to write the message, and it was then received by the email servers of mail.emailprovider.com.
Date: Tue, 29 Mar 2005 15:11:45 -0800 (PST)
From: Mr y
Subject: Hello
To: Mr.x
The date, sender, subject, and destination — Mr. Jones entered this information (except for the date) when he composed the email.
And for IP, look for Received:from followed by the IP within square brackets [ ] e.g.
Received: from [11.11.111.111] by mail.emailprovider.com via HTTP; Tue, 12
Also importantly, there are times when you might find multiple Received: from entries, in that case, please select the last one as the valid choice.

ppLEASEE  FOLLOW  this blog and ADD COMMENT IF U HAV ANY PROBLEM                            PLEASEEEE SHARE  THIS BLOG ON FACEBOOK  / GOOGLE+        IF U LIKE IT     AADISH

Logo Windows 8 Kembali ke "Akar"

Dalam sistem operasi Windows 8, Microsoft tidak hanya memajang antarmuka baru bergaya Metro. Logo anyar pun telah secara resmi mereka perkenalkan lewat sebuah posting di blog resmi Windows.Dengan warna default biru muda, logo baru ini disebut-sebut mencerminkan prinsip-prinsip desain antarmuka Metro khas Windows 8. Hal ini terlihat dari pemilihan bentuk empat kotak (tile) dengan perspektif

Sunday, February 19, 2012

Tips Trik Download Cepat Dengan Torrent

Kali ini saya akan menulis artikel tentang cara mempercepat download lewat torrent. Lebih akuratnya Tips Trick Download Cepat di Torrent. Oke Langsung saja sekarang saya akan mulai. Silahkan membaca

1. Pilih File Yang Seeder-nya Paling Banyak.
Sebelum memilih file torrent yg ingin diunduh, ada baiknya anda perhatikan jumlah seeder dan peer yg ada. Biasanya tiap situs yg menyediakan file

Cara Mengatasi Chat Error Yahoo Messenger (Blank Chat)


  Ssaya pernah mengalami masalah pad Yahoo messenger, jadi ketika saya mengetik chat tulisan tidak muncul dan ketika di kirim juga tetep blank. Padahal chat kita itu sampai di tujuan dan bisa di baca oleh penerima. Hal ini mungkin ini masalah security yang men-disable scripting di setting Internet Explorer anda. Silakan dicoba cara ini.
   1. Klik "Tools" menu toolbar Internet Explorer

Cara Menginstall Aplikasi Blackberry Dari PC

Cara ini sebenernya lebih berguna buat kalian yg pake BIS LITE (Paket Blackberry selain paket unlimited) & kesulitan mengakses WIFI. Cara ini bisa digunakan apabila anda tidak bisa download aplikasi melalui Blackberry Application World atau download melalui Blackberry Browser. Aplikasi yang bisa di download adalah aplikasi add-ons Blackberry yaitu: Yahoo Messenger, Facebook, Gtalk, MSN,

Tutorial Memasangkan Jam Dinding Pada Blogger


Kali ini saya akan mempostingkan sebuah artikel yang berjudul Memasang Jam pada Blog. Gunanya untuk apa? ya kurang lebih untuk memberitahu pengunjung bahwa sekarang adalah jam berapa. Untuk manfaatnya memang kurang mencolok, karena saya sendiri tidak memakannya. Bisa dibuktikan anda scroll saja sidebar disamping pasti ga ada jam. hehe oke langsung saja pertama tama anda harus menuju kesini

Friday, February 17, 2012

Review Mountain Lion, Sistem Operasi Mac OS X

Apple mulai perkenalkan sistem operasi terbaru desktopnya yaitu Mac OS X dengan nama Mountain Lion. Sistem operasi dengan kode resmi OS X 10.8 ini merupakan kelanjutan dari generasi sebelumnya yaitu Mac OS X Lion 10.7.

Untuk saat ini, Mountain Lion baru dirilis bagi kalangan developer saja. Sedangkan versi penuhnya baru akan dirilis sekitar musim panas tahun ini. Meski demikian Apple

Create a Shutdown Shortcut on Desktop


Create a Shutdown Shortcut on Desktop



Shutting Down PC is quite a painful task sometimes. By this sensational trick you can create a shutdown button on your Desktop and Shut Down your PC without much pain. Shutdown button on your desktop allows you to either restart or shut down your computer from a command prompt..
Here's the Trick


_______________________________________________________________________
Right click on the Desktop.
Left click on New  Shortcut.

_______________________________________________________________________

After that, a wizard will appear. In the Type the location of the item: Textbox enter the following code
%windir%\System32\shutdown.exe -s

After entering the code click Next. 


_______________________________________________________________________


 In the Type a name for this shortcut: Textbox enter
Shutdown My Computer (or some other name of your choice)

Click the Finish button.

_______________________________________________________________________
You are done. Whenever you wish to shutdown you PC, double click on the shortcut you just created. 


ppLEASEE  FOLLOW  this blog and ADD COMMENT IF U HAV ANY PROBLEM                            PLEASEEEE SHARE  THIS BLOG ON FACEBOOK  / GOOGLE+        IF U LIKE IT     AADISH




















Thursday, February 16, 2012

Interesting Trick to hide Drive on computer!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!


Hide your drive



Hide Drives and Partitions

Do you have data on a partition or hard drive that you don't want tampered with or easily accessible to other users? Well, you can hide any drive/partition in Windows XP,vista, NT, and 2000. That means that they won't show up in Explorer or My Computer.


Open the Registry Editor by going to Start/Run and typing in "regedit" (without the quotes). Find your way to...

HKEY_CURRENT_USER\Software\Mcft\Windows\CurrentVersion\Policies

Click on "Explorer".



Double-click the "NoDrives" key in the right column. If you don't find a "NoDrives" registry key, just right-click in the right pane and choose "New/DWORD Value" then name the key "NoDrives".

You'll see a value like "0000 00 00 00 00". This is where the fun starts.

  1. The four sets of double zeros (after the "0000") are where you'll enter the values for the drive/partitions. Now, stay with me on this—it's not as complicated as it sounds:

The first column is for drives A-H, the second for I-P, the third for Q-X, and the fourth for Y-Z.

The values for each drive are as follows:

1 - A I Q Y
2 - B J R Z
4 - C K S
8 - D L T
16 - E M U
32 - F N V
64 - G O W
80 - H P X

So, let's say you want to hide drive D. In the first column you would put "08". For drive K you would put "04" in the second column.

But what if you want to hide more than one drive in a column? Simply add the values together: D+E = 8+16 = 24. So in the first column you would put "24".

use the method and, you can rest easy knowing that the files on that drive or partition are less accessible to other users

ppLEASEE  FOLLOW  this blog and ADD COMMENT IF U HAV ANY PROBLEM                            PLEASEEEE SHARE  THIS BLOG ON FACEBOOK  / GOOGLE+        IF U LIKE IT     AADISH













Wednesday, February 15, 2012

How can we lock pdf files and how to unlock it?


 How can we lock pdf files and how to unlock it?




Password protection of your PDF file ensures that the PDF can only be opened by the intended recipient of the file. Password protection can also be used to prevent users from printing or editing the document. These settings can be further tweaked to allow only low resolution printing, and varying degrees of editing.


METHOD 1
To password protect your PDF document in Adobe Acrobat Reader,
go to Advanced > Security > Encrypt With Password.
A prompt will appear asking if you are sure you want to change the security settings. Click on Yes. 


Select Encrypt all document contents, check Require password to open document, and enter the password in the “document open password” field.
If you want control on the permissions to print and edit the document, 
check Restrict editing and printing. Provide the password for changing these settings. Make sure Enable copying of text, images, and other content is unchecked. Click on OK.

A prompt will appear asking you to confirm the passwords you have entered. Another prompt states clearly that not all third-party programs respect the security settings in the PDF file. 


METHOD 2
To lock the pdf files, you need to set a password before you convert the file to pdf. It's easy to make it with Simpo PDF Creator. 

You can set "not allow printing", "not allow copy" etc.

To unlock the pdf, you could use password remover software, or convert the pdf to a new pdf again.

METHOD 3


If you want to lock your PDF file and then unlock it, you can try A-PDF Password Security. This software is professional on protecting any PDF file with different security levels, and you can set restrictions such as non-printing, non-copying to PDF files. And also you can use the tool to remove those restrictions as you doesn't need. 
METHOD 4

use Solid PDF Creator. This will allow you to print your files to PDF and you can set the 
security level that it can only be opened with a password you set. This is a free download and free trial





PLEASEE
  FOLLOW  this blog and ADD COMMENT IF U HAV ANY PROBLEM                            PLEASEEEE SHARE  THIS BLOG ON FACEBOOK  / GOOGLE+        IF U LIKE IT     AADISH