How To : Use AJAX With jQuery [Tutorial]

What is AJAX and Why Its Important ?
AJAX stands for asynchronous JavaScript and XML. If you see another term XHR, which is shorthand for XML HTTP request, it’s the same thing. Don’t be afraid of this jargon; AJAX is not rocket science.

  • In Gmail, switch from inbox to draft. Part of the page is changed, but the page is not refreshed. You remain on the same page. Url has not changed (except for the #draft at the end of the url, but that’s still the same webpage).
  • In Google Reader, select a feed. The content changes, but you are not redirected to another url.
  • In Google Maps, zoom in or zoom out. The map has changed, but you remain on the same page.

The key to AJAX’s concept is “asynchronous”. This means something happens to the page after it’s loaded. Traditionally, when a page is loaded, the content remains the same until the user leaves the page. With AJAX, JavaScript grabs new content from the server and makes changes to the current page. This all happena within the lifetime of the page, no refresh or redirection is needed.
Why Use With jQuery ?
Using core ajax is bit a long process and also little complicated to use for everyone but with jQuery its easier than expectation there’re 4 easy functions to use ajax with jQuery.

  • $.get()
  • $.post()
  • $.ajax()
  • $.load()

Well today i’m going to discuss about 2 methods of them which i really love to use and easier than other two which is $.get and $.post, using both is almost similar.
$.get()
$.get(“dtricks.php”,{“name”:”mohit bumb”},function(response){ //Do Something });
This one line code is enough to send a GET Request to dtricks.php page with variable “name” and value “mohit bumb”, You can get response of that page in response variable and when you get that response you can do some action with it.
$.post()
$.post(“dtricks.php”,{“name”:”mohit bumb”},function(response){ //Do Something });
As i said that both functions are similar so this function can also do same thing but only difference is it sends POST Request instead of GET Request.
Don’t Forget With jQuery
Don’t forget to wrap this function document.ready when using this otherwise it may not work
$(document).ready(function(){
//Your jQuery Function
});

Add SAFE MODE OPTION to BOOT MENU

Follow these steps to add a Safe Mode option to the Boot menu.
When you’re experiencing a problem with Windows XP, you may need to boot the system into Safe Mode more than once. However, doing so can be a tiresome process. When the Boot menu appears, you must press [F8], and then you must select Safe Mode from yet another menu.
Wouldn’t it be nice if Safe Mode were available from the Boot menu? In fact, it’s relatively easy to add a Safe Mode option to the Boot menu.
Here’s how.

1. Press [Windows][Break] to open the System Properties dialog box.
2. On the Advanced tab, click the Settings button in the Startup And Recovery section.
3. In the System Startup section, click the Edit button.
4. When the Boot.ini file opens in Notepad, locate the line that ends with the /fastdetect switch.
5. Highlight and copy that line and paste it in the line below.
6. Change the section on the line that reads

WINDOWS=”Microsoft Windows XP Professional” to WINDOWS=”Safe Mode.”

 Add the following to the end of the line:

/safeboot:minimal /sos /bootlog

TCP/IP Advanced guide

In this article, we will take a look at the TCP/IP protocol stack to help us better understand how TCP/IP functions in the network. We’ll look at the Department of Defense (DoD) protocol layers and the Open Systems Interconnect (OSI) model to help us better understand how the protocols and utilities function at the various layers. This is what I think to be a very easy ISO/OSI and DoD overview. But I guess that will be up to the readers.

 First of all I’m going to talk about ISO/OSI.

The Open Systems Interconnect Model (OSI)

 The Open Systems Interconnect (OSI) model was developed by the International Standards Organization (ISO) and helps to identify how the functions of the protocols relate to each other. By showing how the functions relate, we’ll define how the parts of the protocol stack connect to permit machines to effectively communicate. As we look at the OSI model, remember it is just a model concept- we don’t actually see it when two hosts work together :]. The model, however, is the standard and to communicate we must adhere to it. Basically if two computers that are have similar configuration, they will communicate. If their not, you may end up get nasty error messages, failure to initialize services, or no communication at all.

The OSI Model contains seven layers:

 -Application Layer
 -Presentation Layer
 -Transport Layer
 -Network Layer
 -Datalink Layer
 -Physical Layer

 The chart below compares the layers of the ISO-OSI model to the layers of the DoD model. These models give us a sense of how the communication is expected to take place. Moving from the highest layers down to the wire, we see the application needs to be able to operate without being concerned about identifying all of the lower-level hardware and maintaining drivers for each device.

 http://img.microsoft.com/library/media/1033/technet/images/archive/winntas/maintain/fig2-1.gif

 1. The Application Layer provides support to any end user application programming interface. This layer is responsible for working with the originated data stream and communicates them with lower levels. Examples of Applications Programming Interface (API) would be Mail API (MAPI), MS Fax API (FAPI), Telephone API (TAPI), and internet Server API (ISAPI).

 2. The Presentation Layer provides platform to platform translation of syntax for the purpose of data exchange. Modification of data according to a common set of rules is done at this layer. Compression and encryption, for instance, are also done here.

 3. The Sessions Layer provides for the establishment, maintenance, and recovery form failures that occur between applications. When 2 computers establish a session to share data, control of the flow and direction, and the recovery of missing and corrupt data, is the responsibility of this layer. Depending on the type of application, you might see a simplex, a half-duplex, or a full-duplex of data flow. Simplex is a one-way data flow. Half duplex is basically the same as simplex but implies that there is a duplex channel to permit full duplex if configured to do it. Full duplex provides two-way data flow. By providing appropriate checkpoint methods, the wire between both the computers can stay full of data. Only the data that does not make it properly to the other computer needs to be resent.

 4. The Transport Layer guarantees the data is delivered in the right order and in a reliable manner. Here again we consider error checking and correction as a means to put the information in the right order and to make certain that the whole message is received.

 5. The Network Layer provides routing between internetworks and shields the layers above from the details of the lower layers (the physical topology for example). It is at this level that we first find addressing (IP Address)

 6. The Datalink Layer provides reliable transfer of data across the physical link (i.e. the LAN cable). The datalink layer functions to provide formatting, error detection, link management, and data flow control. Again we find addressing, this time at the hardware layer (Example: Hardware address of the network interface card.)

 7. The Physical Layer accepts data from the datalink layer and puts in the right format for the physical medium. this layer specifies the requirements for the wire such as voltage levels, connector types, and handshake.

 Department of Defense (DoD) Overview

 More than one theory can be used to identify how components in the TCP/IP protocol stack connect  dissimilar systems. This is how each Microsoft TCP/IP component or utility fits this model.
 The DoD four-layer mode contains:
 Network Interface Layer
 Internet Layer
 Transport (transmission) Layer
 Application Layer (known earlier as process layer)

 The Network Interface Layer is the lowest layer in the model. It is responsible for putting frames on and off the wire. In order to get the frames to higher levels, which is where the routing and switching take place, there must be information that permits computers to find each other on the subnetwork. This is the network address of the network card. The Network Interface Card (NIC) contains a hardware address that is mapped to and used by the higher level protocols to pass the information up and down the stack and back and forth across the wire.

 TCP/IP can be used in a wide variety of LAN, WAN, and dial-up environments. Supported LAN typed include: Ethernet, Token Ring, Fiber Distributed Data Interface (FDDI), and ARCnet. Supported WAN types include serial lines and packet-switched networks such as X.25, Frame Relay, and ATM. Metropolitan Area Network (MAN) types of topologies supported using TCP/IP are the same as the previously mentioned WAN types.

 Each of the LAN, MAN, WAN, and Dial-up types have different requirements for cables, signaling, data encoding, and so on. The Network Interface layer specifies is the equivilent to the Datalink and Physical layers of the OSI Model as shown up on the chart.

 The Internet Layer has protocols that provide three specific serives:
 1. A connectionless delivery service
 2. A mechanism to break the data up into individual packets of frames on the transmitting side and to put back together on the recievers side. This is process I believe is also known as Fragmentation and Reassembly.
 3. The routing functions necessary to interoperate with other networks.

 Five protocols are implemented at this layer:
 -The Internet Protocol (better known as IP) which addresses and routes packets
 -The Address Resolution Protector (ARP) which determines the hardware address at the recieving host.
 -Internet Control Message Protocol (ICMP) which sends error messages to the IP when problems crop up.
 -Internet Group Management Protocol (IGMP) which informs the routers of the availability of multicast groups.

 These protocols do their jobs by encapsulating internet datagrams and running all the necessary routing algorithms. (A datagram is a connectionless or one way communication–It is sent with no configuration. Just like when you send a letter to someone) The user data orriginates in one of the higher level protocols and is passed down to the internet layer. The router, then, examines the IP of the datagram to determine whether the destination is local or not (remote). If both machines are on the same network (this is called a local network), the datagram is forwarded directly to the destination of the host. If the destination is on another network (this is called a remote network), the datagram is forwarded to the default gateway (locally attached gateway–router–to remote networks).

 When a network joins the Internet, the administrator must apply for and recieve a valid IP network and host the number from Internet and Information Center (InterNIC). The hosts carry out the functions mentioned here through the use of these numbers, which, when combined, is known as an IP address.

 The Transport Layer has protocols that provide communications sessions between connected computers. The desired method of data delivery determines the transport protocol. The two transport protocols provided within TCP/IP are the transmission control protocols, and the User Datagram Protocol (UDP). TCP provides the virtual circuit service to make the end-to-end connection for the applications. Data Transfer is made reliable throught the use of connections and acknowledgements. The UDP provides delivery but does not use connections or acknowledgements, so it is less reliable but faster. These connectionless protocols I think are define unreliable because nothing is telling you the data was received at the right place. If that’s confusing, try to think of it as a letter. You send the message but their is no way of knowing it reached it’s intended recipient. A connection-oriented protocol however is kind of like making a phone call. You can tell the person on the other side received the message, and possibly understood it.

 The terms “host-to-host” or transmission layer are used interchangeably with the transport layer. The Transport Layer is responsible for error detection and correction in the DoD model and is analogous to the Transport Layer in the OSI model.

 In the Application Layer Microsoft implements two program interfaces at the application layer to allow the applications to utilize the services of the TCP/IP Protocol Stack. These are Windows Sockets and NetBIOS.

 The windows sockets interface provide a standard API under Microsoft Windows to many transport protocols such as IPX and TCP/IP. This open standard library of function calls, data structures, and programming procedures permits Windows applications to take advantage of the TCP/IP. This will pretty much allow you to exchange data with foreign or non-NetBIOS systems.

 NetBIOS provides a standard interface to protocols that support NetBIOS naming and message services, like TCP/IP and NetBEUI. NetBIOS is used in Microsoft products to permit application communication, with lower layer protocols as well. Three TCP ports provide NetBIOS support. These are port 137 which is NetBIOS Name Service, port 138 which is Datagram Service, and port 139 for session service.

 Here are some TCP/IP utilities and services at the application layer:
 FTP, SMTP, SNMP, and Telnet

 Oh by the way, I may not have been very clear on encapsulation. it’s basically the process of adding a header to the data accepted from a higher protocol. When the application originates data, or sends a request to get data , the data or request moves down the total size of the information until it reaches the wire. The individual ones and zeros are sent via the wire to the remote computer where each of the headers is opened or peeled off, I try to think of it as peeling an onion.. idk =D. Anyways… The header information is stripped off at each layer and sent upward to reach, finally, the intended application.

Why Google Adsense disable your account

In my last post, we had discussed about some tips on How to prevent Adsense account getting banned.

Google adsense is the No.1 revenue sharing site for publishers, genuine publishers earn much from Adsense but there are some who believes to mask google and results “Google Adsense disable” by fraud clicks.

 Following are the general ways which cause your Adsense disable.

  1. Clicking your own ads.
  2. CTR manipulation.
  3.  Fooling the visitors.
  4. Multiple fraud clicks from different computers.
  5. Use of Opera Turbo.
  6. Click bots, macros, softwares or black hat methods.
  7. Paid ad click.
  8. Ask friends to click ads.
  9. Ads in post without any content.

Note :- Never try to fool Google.

How to select all friends in facebook page

Now i have a new tweak to select many friends on facebook page, event or suggest friends in a single click.
As we all have many friends in our accounts and it takes too much time to select them all one by one, just a wastage of time.

Follow :-

1. Login to your facebook account.
2. Navigate to the page or event where to select your all friends.
3. Click on Invite friends.
4. New box will appear, scroll down the list until your all friends name is loaded.
5. It will look like,

 6. Now put this script in the address bar, and press Enter.

javascript:var x=document.getElementsByTagName(“input”);for(var i=0;i
 

 
Wait for few seconds.Then see the magic.

 enjoy

How to update blank status on Facebook?

Sometimes if you get bored or you had nothing to update on your wall post, you can try something new by posting a blank status on the wall post to have  fun with your friends. To do this you have to follow a simple and special trick, may be you can call it as Facebook cheat code as well, as given below:
  1. Go to your Facebook profile.
  2. Type “0” and click post.
  3. See the magic of this trick.
Have you ever noticed empty status on facebook like the picture below. Then you must be wandering how to do so? Not to worry I am here to provide a article on upadting empty status on facebook. Facebook is the largest social networking site all over the world. Thousands of people spend their time on facebook updating their status, reading others ,posting and viewing  photos and videos. The number of users in facebook is increasing rapidly. Previously I have provided a article to Get Free Recharge using Facebook and also to Send Free SMS using Facebook. I will be posting more Facebook Tips and Tricks soon and Today you will learn about  How to update empty status on facebook. Its just a small trick see below :
For updating empty status on facebook. You need to type    @[2:2: ]  in the status box in facebook

How To Completely Block Facebook On Computer: FB Limiter

FB Limiter is a windows application that can completely restrict access to Facebook and YouTube on your computer.It is available in both free and paid versions.The Free version allows only complete blocking of you tube and Facebook whereas in paid version you will have the ability to block or unblock these sites for specific interval of time.

Features Of FB Limiter

  • Block Facebook and you tube access on your computer to anyone who uses it (Normal Lock)
  • Limit Facebook and you tube access to specific times during the week (e.g. Allow your kids to use Facebook only one hour a day) (Time Lock – Pro version)
  • Block Facebook and you tube access to yourself for specific time duration. In cases when you are too much distracted and want to be sure you will not get a chance to use Facebook or you tube. (Total Lock – Pro version)
  • Control access to Facebook on daily basis. (e.g. You could limit usage of facebook to just one hour daily) (Duration Lock – Pro version)

How To use Fb Limiter?

Grab your free copy of FB limiter by clicking here.Install and run the software on your computer.You will need to register for a free account to unlock the software.Once registered you will be greeted by a friendly user Interface (see screenshot below)

Now you can block these website on a single click of mouse.
Another great feature of this softwae is that it is password protected.Even if somebody know that you are blocking websites using FB limiter still they won’t be able to unblock them as the software will ask for a password before it can be used.
This software is compatible with windows xp service pack 2 and later.So test out this software and share you experience via comments

 

Trick to Open Multiple Google Talk Accounts

Gmail is the Big daddy of all the email services like yahoomail, hotmail, AOL etc .Usually people create multiple Gmail accounts to isolate their professional and personal life. By default, Google does not allow its users to open multiple instances of Google talk or Gmail accounts simultaneously. By Using this trick you can run multiple instances of Google Talk. I have tested it on windows 7 and it should also work on windows XP and Vista.

Trick to Open Multiple Google Talk Account

  • Create a Shortcut of Gtalk on the desktop
  • Now Right Click on it and select Properties.

C:Program FilesGoogleGoogle Talk.exe /nomutex
 
  • Select Ok button.
  • Now Double Click on Gtalk shortcut to open new instance.You can open any number of instances by clicking on the icon over and again

Here is the Screencast to Open Multiple Google Talk Account

Trick to Access Multiple GMAIL Accounts in Same Browser

If you’re tired of signing in and out, or opening up new browsers in order to check all of your accounts at the same time, you can use multiple sign-in. With multiple sign-in, you’re able to access different Google products with up to 10 accounts using tabs in the same browser. Multiple sign-in is automatically enabled for all Google Accounts.

Your default account

If you use multiple sign-in, the first account you use to sign in during that browser session will be your default account for the rest of that session. If you visit other Google products that don’t support multiple accounts after you’ve signed in, you will automatically sign in to your default account for that product. If you sign out of any Google product while signed in to any account, you will be signed out of all your Google Accounts at once.

To sign in to additional accounts:

  • Sign in to a product that supports multiple sign-in, using an account that has multiple sign-in enabled.
  • Click your name or email address at the top of the page.
  • Select Add account from the drop-down menu.

 

  • On the page that opens, enter the email address and password for another account you wish to access, and click Sign in.
Once you’re signed in to more than one account in the same browser, you can easily switch accounts in the same tab. Just click your name or email address at the top and click on the email address you’d like to sign in to.

Products with multiple sign-in

You can use multiple sign-in with the following desktop versions of these Google products:

  • Alerts
  • Calendar
  • Code
  • Docs (Google Apps accounts only)
  • Finance
  • Gmail
  • Google+
  • Google Moderator
  • Groups
  • iGoogle
  • Maps
  • News
  • Profiles
  • Reader
  • Sites
  • Voice
  • Web Search
  • YouTube
 Features of Gmail that depend on other Google products won’t work with any additional accounts you sign in to. For example, the Calendar Gadget in Gmail labs won’t work with additional accounts because the Calendar Gadget does not yet support multiple accounts.

Launch Multiple Skype Accounts Simultaneously On Your Computer

Skype is preferred Messenger for communication.Ever since its launch it has been adopted for both personal and professional use.It was acquired by Microsoft and has 663 million registered users as of September 2011 and the network is growing larger day by day.Skype is not limited to just instant messaging but it can be used for making voice calls to landlines and mobiles at nominal charges.Like Gmail, Yahoo and other major instant messengers skype also doesn’t allow running multiple instances but their are workarounds for this.In one of my earlier post I wrote about how you can run Multiple Google Talk instances and how to open multiple Gmail accounts in same browser.
You can either opt for manual methods which are quite tiring and difficult or use Multi Skype Launcher which is a free software.It is compatible with windows xp, vista and windows 7.To run this program you should have at least .NET framework 3.5 and Skype 4.0 Installed on your Computer.
How Multiple Instances Can Run using Skype Multi launcher?
Well there is no specific restriction from the software itself but the number of accounts is dependable upon your hardware specifications.As skype uses your hardware you may find dizziness in your system performance if you run too many instances simultaneously.
How To Use Multi Skype launcher?

    • Download Multi Skype launcher from here
    • Installation is pretty straight forward and during this process it will give the option to install G launcher.G launcher is a standalone application that can record your skype conversations.It is completely your choice whether to have this application or not.
    • When you will run the program it will ask for your Skype login credentials.Enter your details and click on OK button.Similarly you can add more accounts.
  • To open a account select the account and click on Launch button.Your account will open in a new window.Repeat this process to open more accounts.
Don’t open too many accounts simultaneously as it can slow down your computer.

Is it Safe To use Multi Skype launcher?
Multi Skype Launcher is completely safe and you login details are never shared.