Friday, January 28, 2011

Are Kim Kardashian’s Shopping Habits Giving Birth To Unhealthy Spending?

January 28, 2011: It has been reported in certain segments of the American entertainment media that the shopping habits of Kim Kardashian, the famous creation of American reality TV, have got worse over the last few months. Retail healing is not a condemnable proposition but the extent of shopping must not cross a certain frontier.  However, the problem seems to be acuter in the 30-year-old Kim’s life, which was admitted by her equally renowned sister, Kourtney, who rebuked Kim in a recent episode of ‘Piers Morgan Tonight’ (PMT) on CNN.  When Kim divulged during the program that she had attained a watch worth $115,000, Kourtney described the acquisition as vulgar. Kim subsequently made it appear that this watch was the most profligate purchase of her life.
That the Kardashians are exceedingly opulent is a well-known fact. However, Kim is not exactly alien to costly acquisitions. There was a ring worth $10,000 purchased by her in the past. She had expended oodles of cash to procure an assortment of fur coats.  She had also indulged in a shopping binge of the value of $100,000 at Hermes where she had procured seven expensive purses.  Also, it needs to be remembered that she resides in a manor at Beverly Hills that is worth a whopping $4.8 million.
Morgan seemed stunned on realizing that Kim had expended such colossal cash on a timepiece, to which Kim verbalized that she had obtained a fabulous deal. The amount released by Kim for her watch is in excess of the money expended by many Americans for college tuition.  However, Kim, to her credit, does discharge 10% of her proceeds to charitable foundations.
Therefore, it is up to the audience to determine whether this ‘shopaholic spending’ of Kim is unhealthy or healthful.
Also, in PMT, Kim communicated frankly about her romance with the 25-year-old basketball competitor, Kris Humphries.  Kim verbalized that she would love to get hitched with Kris but that she has only commenced to date him recently. However, Kim twittered a photo of Kris when he was a baby and mentioned that she desired her future baby to appear like the baby Kris.  Kris, a competitor of the New Jersey Nets (NJN), has purportedly been hunting a ring for Kim, his girlfriend. Kim articulated in PMT that Kris, who is a lofty guy of ‘six foot nine’, makes her feel scrawny.
Also, in PMT, Kim expressed thankfulness to her ex-beau, Reggie Bush, for assisting her to overcome her humiliation and mortification subsequent to the leakage of the tape of Kim having sex with the vocalist, Ray J, with the two being in a romance briefly in 2007.

Wednesday, January 26, 2011

Protect USB Drive From Virus With Dummy Files

To prevent virus attacks to your PC, you must make your USB storage device free from virus as well which are most of the time plug and played to your PC.



Usually, most of the virus and worms copies to your USB drive easily. No matter what you do, you cannot stop this action form virus when you insert your USB drive to infected computer. But to prevent from un-authorized copying of viruses you can make your USB storage device completely full so that no more files can be added to it.


But filling up the storage device will not be practical as you have to add some heavy contents there and you won’t like to put large contents which will often hectic job. But after following this tutorial you’ll feel easier to do that.

Initially assume that you have some files in your USB drive and you want to fill up the remaining space.
 

First download  USBDummyProtect (an executable 4KB ZIP file). Once you’ve downloaded the file extract it and copy the exe file in to your USB root drive. 

 

You can see in the first image that we’ve about 1GB disk space left, this tool will help you to fill the remaining space easily by creating a dummy file.

Once the exe file has been copied, run the program by double clicking it. As soon as the program runs, the program start
s to create a dummy file that has enough size to fill of all the remaining space of your USB storage device. 

Once the dummy file creation is successful you’ll be notified. Press enter to close the program.

You can see a dummy.file in your USB drive.


Also check out y
our USB device disk space.


It must have filled now with zero space available. This will prevent other infectitous programs to copy itself to your USB drive.

Incase if you want to copy some files from your own non-infected PC then delete the dummy.file and again run the program.

Hope this tutorial was helpful.

How to open office 2007 files on Office 2003

To resolve the compatibility issues between the Office 2003 and Office 2007. Because all programs in office 2003 used the old file extensions for its different programs. For example Word 2003 saved files with extension .doc, Excel 2003 with .xls and PowerPoint with .ppt. but on the other office 2007 used the new file extensions for its different programs.

For example Word 2007 saved files with extension .docx, Excel 2007 with .xlsx and PowerPoint with .pptx. Now the problem is that when you will try to open office 2007 files into office 2003 and you will not open the file due to compatibility issues between both office versions. Microsoft provides a free compatibility pack to convert office 2007 documents to the office 2003 format. There are many third party free converter are available but here we are using Microsoft office compatibility pack.


Follow the given steps to download free Microsoft compatibility pack and install it.


To use this feature, you will need to be logged into your computer with administrative rights.
Visit the following link to download the Microsoft compatibility pack :FileFormatConverters.exe

Use trial version of Software forever

a small tool and by using this tool you can use the trial version of any software forever. The tool is “Time Stopper“. It is very easy to use 
 How does it work?
  • Just install ‘Time Stopper‘
  • Open it and 
  • First delete all other shortcuts of the trial version software and create a new shortcut from ‘Time Stopper’.
That’s it , you are done. But Always open your software from that shortcut which you created from fourth step. Ok You have now stopped the time for that software. Isn’t it interesting? So from now, you don’t need to change your System clock for any trial version software. Just use ‘Time Stopper‘. It works on all version of window.
Download : Click this direct link to Download ‘Time Stopper’ OR Go to Author’s webpage.
Note : If you really like the software whose trial version you are using, I would recommened you to buy the software.

How to hide files in JPEG pictures

If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else.


I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file!

You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else. Not only that, you can actually store many files inside of single JPG file, not just one! This can come in very handy if you need to hide files and don’t want to bother with encryption and all that other technical stuff.

Hide File in Picture


In order to accomplish this task, you will need to have either WinZip or WinRAR installed on your computer. You can download either of these two off the Internet and use them without having to pay anything. Here are the steps for creating your hidden stash :
  • Create a folder on your hard drive, i.e. C:\Test and put in all of the files that you want to hide into that folder. Also, place the image that you will be using to hide the files in.
 

  • Now select all of the files that you want to hide, right-click on them, and choose the option to add them to a compressed ZIP or RAR file. Only select the files you want to hide, not the picture. Name it whatever you want, i,e. “Hidden.rar”.
  • Now you should have a folder that looks something like this with files, a JPG image, and a compressed archive :
  • Now here’s the fun part! Click on Start, and then click on Run. Type in“CMD” without the quotes and press Enter. You should now see the command prompt window open. Type in “CD \” to get to the root directory. Then type CD and the directory name that you created, i.e. “CD Test“.

  • Now type in the following line: “copy /b DSC06578.JPG + Hidden.rar DSC06578.jpg” and press Enter. Do not use the quotes. You should get a response like below:
Just make sure that you check the file extension on the compressed file, whether it is .ZIP or .RAR as you have to type out the entire file name with extension in the command. I have heard that some people say that they have had problems doing this with a .ZIP extension, so if that doesn’t work, make sure to compress to a .RAR file.
And that’s it! The picture file will have been updated with the compressed archive inside! You can actually check the file size of the picture and see that it has increased by the same amount as the size of the archive.
You can access your hidden file in two ways. Firstly, simply change the extensionto .RAR and open the file using WinRAR. Secondly, you can just right-click on the JPG image and choose Open With and then scroll down to WinRAR. Either way, you’ll see your hidden files show up that you can then extract out.

That’s it! That is all it takes to hide files inside JPG picture files! It’s a great way simply because not many people know it’s possible and no one even thinks about a picture as having to the ability to “hide” files. Enjoy!

Free Tools to Track & Recover Your Stolen Laptop

Off late, in coffee shops, college campuses, hotel lobbies and even in cars, laptops and notebook computers are being targeted by criminals. But don’t worry, we can increase the odds of recovering / tracking your stolen laptop and that too for FREE!


Ways to Track and Recover your Stolen Laptop


Track your Stolen laptop with Adeona 

Adeona from University of Washington provides an open source, free and completely non-proprietary way to track your stolen laptop. You can install Adeona on your laptop and go as there’s no need to rely on a single third party! What’s more, Adeona addresses a critical privacy goal different from existing commercial offerings. It is privacy-preserving. This means that no one besides the owner (or an agent of the owner’s choosing) can use Adeona to track a laptop. Unlike other systems, users of Adeona can be rest assured that no one can abuse the system in order to track where they use their laptop.

Locate your laptop with LocateMyLaptop.com



LocateMyLaptop  is a free service that offers a stealthy app on your laptop which reports its position whenever the computer is connected to the Internet . If it’s lost or stolen, you can issue a self-destruct command to erase all the data on the hard drive – but that requires upgrading to the Platinum Plan, which costs $3/month. But you do not need to pay anything until the disaster strikes. this is because, tracking of laptop is FREE, and you can upgrade to the platinum service only if your laptop gets stolen

Browser Plugin to Track your stolen Laptop – Loki


Loki is basically a service which can add location of users to any website. But it can be tweaked in such a way that you can log directly into Loki to see your laptop’s location on a map, or enable “sharing” – which blasts your location to a public Web page, to Twitter, Facebook, or a handful of other services. Only concern is, Loki is not always reliable as it sometimes fails to update the public page with laptop’s location. This issue is seen even when Loki browser plugin on the laptop knew where it is. Hopefully this issue should be fixed by the next release.




Locate your stolen Laptop with LocatePC


LocatePC is FREE software which lets you track and finally get back your stolen computer or laptop back to you. LocatePC sends you a secret email message from your stolen computer or laptop with some crucial information. But again, we will be hoping that the thief will connect the laptop to the internet before formatting. Still, something is better than nothing right? 

Building a process/software something inherent with the PC/laptop/notebook is what one might have to look at. But that will have its own pros n cons with respect to privacy, transfer of laptop etc. Do pour in your valuable thoughts

Sync Android Phone with PC via Android Manager Wifi

Owning an Android Smartphone is like having a mini-computer in your pockets. The data stored in your Android smartphone is invaluable to say the least. By synchronizing your Android phone with the PC, you can easily backup and manage your contacts, messages, photos, videos, music, applications as well as calendar events. Android Manager WiFi is a free tool which lets you do exactly that, via WiFi!


It supports all versions of Android and most versions of Windows (XP & above). You are required to download and install the Windows application, as well as the Android app, both of which are available on the developer website.

Android Manager WiFi allows the Android phone to connect with PC wirelessly via WiFi and it has the following data sync features- 
  • Contacts: Edit and Backup Contacts. 
  • Messages: Send and Backup Short Messages at PC. 
  • Photos: Import and organize photos with albums. Edit and Upload photos to Android Phone as wallpaper. 
  • Videos: Management of video files. 
  • Music: iTunes-like interface to manage music files and playlist. 
  • Applications: Install APK file and backup applications at PC. 
  • Files: Manage files in Android Phone. 
  • Sync: Synchronization Contacts/Calendar with Outlook, Outlook Express and Windows Contacts. 
Once both the Windows and mobile apps are installed, the PC and the Android device should be connected to the same wireless network. The client app on the Android device will then generate a random PIN which must be entered on the PC to identify the device and secure the connection. The client will display its IP address on the wireless network and await a connection from the desktop.


On the desktop PC, the PIN number and IP address of the Android device should be entered under the connection settings.


Once connected, the status will be updated on the Android device


You can now synchronize your Contacts with your desktop via Outlook, manage your files, applications, messages, images and videos. 

Ways to Track and Recover Your Lost/Stolen iPhone

iPhone is the world’s best smart phone available today without any doubt. People carry their phones everywhere they go, and hence there is always a chance of them forgetting their iPhone somewhere or the iPhone getting stolen. Learn how to track, message, erase and recover your lost or stolen iPhone.


Track or Locate your iPhone


Track your iPhone via MobileMe

Apple service called Find My iPhone that will allow iPhone owners to remotely locate their lost or stolen iPhones using the iPhone’s GPS. The service will be available as part of Apple’s MobileMe online subscription service. 

Find My iPhone will pinpoint the iPhone’s current location using Google Maps and let owners send and display a message on the iPhone even if it’s locked, presumably to provide information on how to return the phone to the finder of the phone. The Find My iPhone feature can also force the iPhone to play a sound for 2 minutes, which is useful for not only getting the attention of the finder of iPhone but also locating it between couch cushions. 


The Find My iPhone feature will require a subscription to Apple’s MobileMe service, whichcosts you $41,16   


But now Find My iPhone Goes Free with iOS 4.2


Apple’s Find my iPhone service which was available as part of the annual paid service – MobileMe has gone completely free with the release of iOS 4.2 for all iDevices including iPhone, iPod Touch and iPad. While the other MobileMe services will still remain premium, this one feature is now available free for everyone.



With ‘Find my iPhone’, users can login to www.me.com and track their iPhones or iPads right from their PCs or Macs  Not just that, users can also make their phones play a sound even if it is in silent mode or remotely locked. One can even wipe the data completely in case he is sure that the device has been stolen.


iPhone anti-theft solution – iLocalis

iLocalis lets you track your iPhone device location and also remote control it! It is considered as the best theft-tracking and remote control utility for Apple iPhone.


iLocalis has the following uses :
  • Never lose you iPhone: If it is missing just log onto the iLocalis site and you’ll know where it was located last. 
  • Retrieve a stolen iPhone: If your iPhone is stolen you can log into the site and check out where it’s at. Extra features built into iLocalis allow you to send text messages or make calls on your iPhone when you don’t even have it with you. If you iPhone is stolen log in and send yourself a text message. If the thief changed the sim card you’ll have their phone number! 
  • Allow your family and friends to know where you are: iLocalis will send a message to your friends when you are near by. You can also set it up to allow your friends to locate you. If your friend also has iLocalis you can send messages to each other for free. No txt messaging charges. 
  • iLocalis can also be used for a business that needs location services for their employees. Employees carrying iPhones with iLocalis can be tracked via the web site easily.


Note: iLocalis needs a jailbroken iPhone with Cydia installed and supports all firmware versions on iPhone 3G and 3GS.

GPS tracking for iPhone with Mobile Spy 3.0

Mobile Spy version 3.0 spy software for Apple iPhone from Retina-X studios allows users to track GPS locations, SMS messages and calls of employees, teen or family mobile phones by logging into SSL secured online control panel from any computer or phone’s web browser.


Mobile Spy allows users to monitor their handsets in real time and runs in the background behind all other applications. After the spy software is setup on the cellphone, it will silently record SMS messages, GPS locations and call activities, and then upload the data to your private Mobile Spy secure online account. 

The Mobile Spy version 3.0 software is compatible with all iPhone models, Windows Mobile or Symbian OS based smartphone and is priced at $99.97 (1-year subscription).


Find and Recover your Stolen iPhone with iHound

This free security program alerts you when your iphone is connected to another individual’s computer. It will also track down the location of where your device is being used. 

When your missing iPhone is being plugged in to a computer, you will :
  1. Get an email saying that your tracked device is being located.
  2. Get a detailed report on where it is being used by logging in to iHound’s website. 
The second method can be very useful when the stolen iPhone is switched off and later gets connected to a computer for changing software or formatting the memory card




Recover your Lost/Stolen iPhone with Navizon app


Navizon is a hybrid positioning system combining GPS, Wi-Fi and Cellular triangulation techniques. It calculates the geographic location of a wireless device by analyzing the signals from nearby Wi-Fi access points and cellular towers and comparing it against a database of known data points. A new option called Locate-by-SMS allows you to locate your lost iPhone by just sending an SMS text message to it. 


MyFoundCast


MyFoundCast, a patent pending technology is the internet’s first lost and found service that allows you to create custom wallpaper and embed information into that wallpaper so when somebody finds your iPhone or iPod Touch they will know how to return it. All members are given a unique tracking ID and automatically registered in our lost and found database. You may register the serial number of any iPod or iPhone. 

I am not sure if this really works. If someone is honest enough to return your iPhone he/she will do some basic research on the owner of the iPhone and return it back. Isn’t it

Monday, January 24, 2011

Beautiful Sport Girls

Sport gives us a lot of excitement, emotions, adrenaline rushes, and satisfaction. I’ve always liked sports of any kind, and after looking at this ladies, I’m even into girls sports! These girls are talented, great in their sports, and drop dead gorgeous! Just choose any sport, and you’ll find at least one beautiful girl. This is not some kind of final list, it’s just random pick from so many beauties. Now, I’m watching all sports, for more excitement and satisfaction!

Ana Ivanovic

beautiful sport girls01 Beautiful Sport Girls

Daniela Hantuchová

beautiful sport girls02 Beautiful Sport Girls

Marisa Miller

beautiful sport girls03 Beautiful Sport Girls

jelena Isinbaeva

beautiful sport girls04 Beautiful Sport Girls

Lauren Elizabeth Jackson

beautiful sport girls05 Beautiful Sport Girls

Gabrielle Reece

beautiful sport girls06 Beautiful Sport Girls

Victoria Azarenka

beautiful sport girls07 Beautiful Sport Girls

Jennie Finch

beautiful sport girls08 Beautiful Sport Girls

Natalie Gulbis

beautiful sport girls09 Beautiful Sport Girls

Dara Torres

beautiful sport girls10 Beautiful Sport Girls

Ashley Tappin

beautiful sport girls11 Beautiful Sport Girls

Malia Jones

beautiful sport girls12 Beautiful Sport Girls

Maria Kirilenko

beautiful sport girls13 Beautiful Sport Girls

Maria Sharapova

beautiful sport girls14 Beautiful Sport Girls

Alisson Stokke

beautiful sport girls15 Beautiful Sport Girls

Kama Sutra Technique : Ballon Edition

Kama Sutra books are usually hidden place where children will not find it. But it was another Russian artist Anton Lobachev create a series of funny animated characters since he took the balloon and the theme kamasutra to indulge his imagination. So now, they can be displayed safely:)