Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.
How to create a Password Protected Folder?
Step-1: Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as ABC.
Step-2: Now in this folder place all the important files, documents or any folders that you want to password protect.
Step-3: Now Right-click on this folder (ABC) and select the option Send To -> Compressed (zipped) Folder.
Step-4: Now a new compressed zipped folder gets created next this folder (ABC) with the same name.
Step-5: Double-click on this compressed zipped folder and you should see your original folder (ABC) here.
Step-6: Now goto the File menu and select the option Add a password.
ie: File -> Add a password
Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the password protected folder.
How to make it Invisible?
Step-1: Now Right-click on this password protected folder and select Properties.
Step-2: At the bottom select the option Hidden and press OK. Now your folder gets invisible (hidden).
Step-3: In order to unhide this folder go to My Computer – >Tools -> Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options
Do not show hidden files and folders
Show hidden files and folders
Now select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password. To make it invisible again repeat step -1 through step-3 and select the first option and click OK. Now the folder becomes invisible once again.
Go to ur xplorer and select image.
Then edit its name as shown in below image
Example – if your image name is ‘village.jpg’ then edit like this ‘patho.jpg.txt’
Then click on ‘village.jpg.txt’ file there you can see the mobile from which this image is captured and its date on which it is captured
IMP NOTE –
1.This will work only with the images captured from mobile camera
2.only works with images which are not edited by any means
Google is indisputedbly the best search engine out there on the Internet, however there are a few ways by which you can customize Google and make it even better. I have got 3 best free Firefox extensions using which you can customize Google by adding extra useful information to your search results and remove unwanted informationlike ads, spam and click tracking so as to improve the overall searching experience. The following are the 3 best extensions for Firefox using which you can improve the search results.
Using OptimizeGoogle, you can get rid of text ads from Google search results, add links from about 10 other search engines, add position counter, product results and more. You can even filter your search results to see dead websites (using WayBack Machine) and remove click tracking so that you can search anonymously. Here is a list of some of the other useful features of this plugin.
1. Use Google suggest (get word suggestion while typing)
2. Add more security by using https wherever necessary
3. Filter spammy websites from search results page
4. Option to remove SideWiki
5. Add links to bookmark your favorite result
6. Add links to other news and product search sites
To install the plugin, just visit the OptimizeGoogle page from your Firefox browser and click on the Download button. Once installed, you can enable or disable the customization options from the Tools -> OptimizeGoogle Options.
After you customize Google to improve the search results, how about adding a feature that provides a way to preview the website in the search results itself? Here is a miracle Firefox extension to this job for us.
SearchPreview (formerly GooglePreview) will insert thumbnail view of the webpage into the Google search results page itself so that you can take the guess work out of clicking a link. Just install the plugin, reload Firefox and you will have the SearchPreview at work. You can install this plugin from the following link.
OptimizeGoogle and SearchPreview have made our search results smarter and faster. Now how about safer? Well you have another Firefox plugin to make your search results safer as well. Here we go.
3. McAfee SiteAdvisor:
This is a free browser plugin that gives safety advice about websites on the search results page before you actually click on the links. After you install the SiteAdvisor plugin, you will see a small rating icon next to each search result which will alert you about suspecious/risky websites and help you find safer alternatives. These ratings are derived based on various tests conducted by McAfee.
Based on the quality of links, SiteAdvisor may display Green, Yellow, Red or Grey icon next to the search results. Green means that the link is completely safe, Yellow means that there is a minor risk, Red means a mojor risk and Grey means that the site is not yet rated. These results will guide you to Web safety.
SiteAdvisor works on both Internet Explorer and Firefox which you can download from the following link:
I hope you enjoy these 3 plugins which make your searching experience a lot more simpler and safer. Here is a snapshot of all the 3 plugins at work.
Remove programs you no longer use or knew about:
Over time, you may have installed games or utilities that you forgot about or no longer use. Why waste the space? Go to your control panel, AddRemove programs and uninstall anything you no longer use.
step 1: click start then settings then click control panel
step 2: then look for add and remove programs then open
step 3: then remove apps/ programs that u don’t use
Cleaning your hard drive of unneeded files:
One of the biggest problems is hard drive usage. Your hard drive has more moving parts then any other in your computer and is constantly adding, deleting and reorganizing files. Because of this, you want to clean your computers hard drive. A great tool for this is CCleaner
click here –>http://www.ccleaner.com
Remove invalid registry entries:
Next up is the registry. Frankly, the registry is overrated as a speed tweak, in general, but it does get large and can contain many invalid references. The registry is not an area for even the average computer user to be playing around in. The good news is CCleaner has a safe registry cleaner built in, so why not clean out old, invalid entries?
See all those icons in the lower right corner of your screen? Those are all being loaded on startup, and those are not all of them either! If your wondering why you have to wait a minute to use your computer after startup, it is because all of those items are loading after Windows has started. They also use up memory just sitting there. Removal takes a bit more knowledge, or research, then the previous two, but you can do it!
First off, if you know what these items in the tray are and do not need them running, you can either right click an icon and look for options or a “run with Windows” option. Otherwise, you can double click any icon to open the program and look for options from there. Some are easy and common. Quicktime, AOL and RealPlayer are good examples of items that do not need to be there.
CCleaner also has a startup manager. Click tools, then startup. You can delete any unneeded items from there. Be careful, there is no backup, so either look up the program on Google or ask on our forums if you want to know what an item is for. Because the startup loads drivers and some programs you may need, be careful removing items you are unsure of.
Defragment your hard drive
Now that you have removed all of this garbage, you have defragmented files all over your hard drive. Reading and writing data on a heavily fragmented hard drive is slowed down because the time for the heads to move between fragments on the disk surface can be substantial. The files on your hard drive now probably look like a box of tacks after I open them and toss them on the ground. Defragmenting your hard drive would be like the box of tacks still sealed. All neat and tidy and easy to get at.
If you are in that same situation, here is a simple strategy that will certainly increase your blog traffic and make you break the 1,000 daily page views mark. In fact, the strategy could be used even if your are already over that number but have reached a traffic plateau lately.
Just make sure to execute the 4 steps as planned and to spend the two hours and a half every day (obviously if you have more time available you can expand the time spent on each of the four steps proportionally).
First Step: Killer Articles (1 hour per day)
Spend one hour brainstorming, researching and writing killer articles (also called linkbaits, pillar articles and so on).
Notice that your goal is to release one killer article every week. If that is not possible aim for one every 15 days. So the one hour that you will spend every day will be dedicated to the same piece. In other words, expect killers articles to take from 5 up to 10 hours of work.
If you are not familiar with the term, a killer article is nothing more than a long and structured article that has the goal of delivering a huge amount of value to potential visitors. If you have a web design blog, for example, you could write an article with “100 Free Resources for Designers”. Here are some ideas for killer articles:
* create a giant list of resources,
* write a detailed tutorial teaching people how to do something,
* find a solution for a common problem in your niche and write about it, or
* write a deep analysis on a topic where people have only talked superficially
When visitors come across your killer article, you want them to have the following reaction: “Holy crap! This is awesome. I better bookmark it. Heck, I better even mention this on my site and on my Twitter account, to let my readers and friends know about it.”
Second Step: Networking (30 minutes per day)
Networking is essential, especially when you are just getting started. The 30 minutes that you will dedicate to it every day could be split among:
* commenting on other blogs in your niche,
* linking to the posts of bloggers in your niche, and
* interacting with the bloggers in your niche via email, IM or Twitter.
Remember that your goal is to build genuine relationships, so don’t approach people just because you think they can help to promote your blog. Approach them because you respect their work and because you think the two of you could grow together.
Third Step: Promotion (30 minutes per day)
The first activity here is the promotion of your killer articles. Whenever you publish one of them, you should push it in any way you can. Examples include:
* letting the people in your network know about it (don’t beg for a link though),
* letting bloggers and webmasters in relevant niches know about it,
* getting some friends to submit the article to social bookmarking sites,
* getting some friends to Twitter the article, and
* posting about the article in online forums and/or newsgroups.
If there is time left, spend it with search engine optimization, social media marketing and activities to promote your blog as whole. Those can range from keyword research to promoting your blog on Facebook and guest blogging.
Fourth Step: Normal Posts (30 minutes per day)
Just like a man does not live by bread alone, a blog does not live by killer articles alone. Normal posts are the ones that you will publish routinely in your blog, between the killer articles. For example, you could publish a killer article every Monday and normal posts from Tuesday through Friday. Here are some ideas for normal posts:
* a post linking to an article on another blog and containing your opinion about it
* a post informing your readers about a news in your niche
* a post asking a question to your readers and aiming to initiate a discussion
* a post highlighting a new resource or trick that you discovered and that would be useful to your readers
While killers articles are essential to promote your blog and bring new readers aboard, normal posts are the ones that will create diversity in your content and keep your readers engaged.
Aakash is now upgraded and the earlier version of it is totally sold out now you can book it by clicking
- Processor: Connexant with Graphics accelerator and HD Video processor
- Memory (RAM): 256MB RAM / Storage (Internal): 2GB Flash
- Storage (External): 2GB to 32GB Supported
- Peripherals (USB2.0 ports, number): 2 Standard USB port
- Display and Resolution: 7” display with 800×480 pixel resolution
- Input Devices: Resistive touch screen
- Connectivity and Networking: GPRS and WiFi IEEE 802.11 a/b/g
- Power and Battery: Up to 180 minutes on battery. AC adapter 200-240 volt range.
- OS: Android 2.2
- Document Rendering
- Supported Document formats: DOC, DOCX, PPT, PPTX, XLS, XLSX, ODT, ODP
- PDF viewer, Text editor
- Multimedia and Image Display
- Image viewer supported formats: PNG, JPG, BMP and GIF
- Supported audio formats: MP3, AAC, AC3, WAV, WMA
- Supported video formats: MPEG2, MPEG4, AVI, FLV
- Communication and Internet
- Separate application for online YouTube video
- Safety and other standards compliance
- CE certification / RoHS certification
- Other: Additional Web Browser: UbiSurfer-Browser with compression/acceleration and IE8 rendering.
CLICK HERE FOR MORE DETAIL
Conference calls can be designed so that the calling party calls the other participants and adds them to the call; however, participants are usually able to call into the conference call themselves by dialing into a special telephone number that connects to a “conference bridge” (a specialized type of equipment that links telephone lines).
Companies commonly use a specialized service provider who maintains the conference bridge, or who provides the phone numbers and PIN codes that participants dial to access the meeting or conference call.
Three-way calling is available (usually at an extra charge) for many customers on their home or office phone line. To three-way call, the first person, who is the one who someone wishes to talk to is dialed. Then the Hook flash button (known as the recall button in the UK and elsewhere) is pressed and the other person’s phone number is dialed. While it is ringing, flash / recall is pressed again to connect the three people together. This option allows callers to add a second outgoing call to an already connected call.
for detail about conference call click here
This book will help you:
- Understand PHP essentials and the basics of object-oriented programming
- Master MySQL, from database structure to complex queries
- Create web pages with PHP and MySQL by integrating forms and other HTML features
- Use libraries and packages, including the Smarty web template system, PEAR program repository, and the Yahoo! User Interface Library
- Make Ajax calls and turn your website into a highly dynamic environment
- Upload and manipulate files and images, validate user input, and secure your applications
Click here to download the file
Here is a solution to this problem. Go to Run>type Regedit and press enter.
Now navigate to
Make sure there is an entry called CheckedValue with type REG_DWORD and value is ‘1’
Now come back to folder option and set show hidden files and it will work