Thursday 13 October 2011

CONFUSED BETWEEN CORE 2 DUO AND DUAL CORE?


INTEL CORE 2 DUO-
  • THE CORE 2 BRAND REFERS TO A RANGE OF INTEL'S CONSUMER 64-BIT x86-64 SINGLE, DUAL, QUAD CORE CPU'S BASED ON INTEL CORE MICRO TECHNOLOGY
  • CORE 2 DUO ARE MUCH POPULAR THESE DAYS
  • IT HAS A VERY POWERFUL DUAL CORE CHIP
  • IT ALSO CONSUMES LESS POWER THAN ANY OTHER CPU
  • NO OVERHEATING ISSUES
  • IT RUNS COOL AND PERFECT




INTEL PENTIUM DUAL CORE-

  • EXCELLENT CHOICE FOR OVERCLOCKERS ON A LOW BUDGET
  • IT IS BASED ON THE POPULAR CORE 2 DUO ARCHITECTURE.
  • THE NUMBER OF CORES ARE SAME
  • BUT THE CPU COMES WITH ONLY 1 MB L2 CACHE INSTEAD OF 2MB OR EVEN 4 MB.
  • IN ADDITION, SOME FEATURES, SUCH AS INTEL'S VIRTUALIZATION TECHNOLOGY (VT) ARE DISABLED.
  • THE RESULT IS A CASTRATED CORE 2 DUO PROCESSOR, USING THE SMALL CACHE SIZE AND LIMITED TO 1.6 TO 2 GHZ CLOCK SPEED AT FSB 800 SYSTEM SPEED



THE FINAL CONCLUSION




OR




  • INTEL DUAL CORE PROCESSORS ARE DOWNGRADED VERSION OF CORE 2 DUO
  • LESS EXPENSIVE
  • BUT STILL ADEQUATE FOR GENERAL MAINSTREAM COMPUTER USE.
  • IN TERMS OF PERFORMANCE ITS MORE OR LESS EQUAL TO CORE 2 DUOS.
  • INTEL LAUNCHED IT WITH VERY LOW COST TO GRAB THE LOWER END MARKET. 



O\




Friday 7 October 2011

A TRIBUTE TO STEVE JOBS


STEVE JOBS WAS A LEGEND, HE WAS A VISIONARY AND A CREATIVE GENIUS, NOT TO FORGET AN AMAZING HUMAN BEING. HE STARTED THE COMPANY WHICH CHANGED THE WORLD, WHICH WE CALL "APPLE".


WHY DID HE NAME THE COMPANY APPLE?
STEVE JOBS WORKED SUMMER JOBS AT A CALIFORNIA APPLE FARM. HE ALSO LIKED BEATLES AND THEIR LABEL, APPLE RECORDS.
WHEN HE AND STEVE WOZNIAK TRIED TO COME UP WITH A COMPANY NAME, THEY DECIDED THAT IF THEY COULDN'T THINK OF ANYTHING BETTER BY THE END OF THE DAY, THEY'D GO WITH THE NAME "APPLE". AND THEY COULDN'T, SO THEY DID.


APPLE COMPUTERS WAS FOUNDED ON APRIL 1, 1976


HIS ACCOMPLISHMENTS


APPLE CO-FOUNDER STEVE JOBS WAS A LIVING LEGEND IN SILICON VALLEY, THE MAN WHO CHANGED MODERN CULTURE WITH THE iPOD, iPHONE, AND iPAD.
APPLE I

1976: THE APPLE 1, WAS THE ORIGINAL APPLE PERSONAL COMPUTER.

APPLE II

1977: APPLE II WAS DESIGNED TO LOOK LESS LIKE A PIECE OF ELECTRONIC EQUIPMENT AND MORE LIKE A HOME APPLIANCE.


APPLE LISA

1983: THE APPLE LISA WAS CONSIDERED A COMMERCIAL FAILURE BECAUSE OF ITS HIGH PRICE TAG ($10,000). IN 1982, STEVE JOBS WAS FORCED OUT OF THE LISA PROJECT AND JOINED THE MACINTOSH INSTEAD.


THE MACINTOSH


1984: THE MACINTOSH WAS LAUNCHED WITH THE HELP OF A RIDLEY SCOTT TELEVISION COMMERCIAL THAT AIRED DURING  THE SUPERBOWL. THE MACHINE WAS CONSIDERED CHEAPER THAN LISA.


NEXT

1989: NEXT WAS FOUNDED IN 1985 BY STEVE JOBS AFTER HE RESIGNED FROM APPLE. APPLE THEN PURCHASED NEXT IN LATE 1996


THE iMAC
1998: THE iMAC, THE DESKTOP COMPUTER BUILT BY APPLE, HAS TAKEN MANY SHAPES SINCE THE ORIGINAL WAS LAUNCHED IN 1998


THE iPOD
2001: THE iPOD CHANGED HOW PEOPLE ALL AROUND THE WORLD CONSUME MUSIC


iTUNES


iPHONE
2007: THE iPHONE IS AN INTERNET AND MULTIMEDIA- ENABLED SMARTPHONE. THERE ARE NOW FIVE GENERATIONS OF THIS DEVICE, AND EACH NEW MODEL IS GREETED WITH ENORMOUS LINEUPS AT APPLE STORES ALL AROUND THE WORLD.


iPAD
2010: THE iPAD ONCE AGAIN CHANGED HOW PEOPLE INTERACT WITH TECHNOLOGY. THE TABLET COMPUTER IS A PLATFORM FOR MANY DIFFERENT TYPES OF MEDIA INCLUDING BOOKS, GAMES, MOVIES AND WEB CONTENT.
TO KNOW MORE ABOUT STEVE JOBS, DO   
WATCH THE MOVIE- PIRATES OF THE SILICON VALLEY



Steve Jobs bio: Jobs told author, ‘I wanted my kids to know me’.


STEVE WE ALL HOPE YOU REST IN PEACE.












Wednesday 5 October 2011

WHAT IS WINDOWS FIREWALL AND HOW DOES IT PROTECT YOU?

  • As the name suggests, its a wall against any harmful activity online.
  • A firewall helps to keep your windows more secure
  • It restricts information that comes to your computer from other computers, giving you more control over the data on your computer and providing a line of defense against these programs(viruses and worms) that try to connect to your computer without information



    • You can think of a firewall as a barrier that checks information (often called traffic) coming from the Internet or a network and then either turns it away or allows it to pass through to your computer, depending on your firewall settings.

    NOW YOU CAN VERY WELL IMAGINE HOW INSECURE YOUR PC WOULD BE WITHOUT A FIREWALL

    Friday 30 September 2011

    Clear Recently Visited Website History In Chrome , firefox

    As you browse the web, Firefox helpfully remembers lots of information for you – sites you've visited, files you've downloaded and more. All of this information is called your history. However, if you are using a public computer or share a computer with someone, you may not want others to be able to see these kinds of things.
    This article explains what information is stored in your history and gives you step-by-step ways to clear all of part of it. To temporarily have Firefox not store any history, see Private Browsing.

    How do I make Firefox clear my history automatically?

    If you need to clear your history every time you use Firefox, you can set it to happen automatically on exit so you don’t forget.
    1. At the top of the Firefox window, click on the Firefox button (Tools menu in Windows XP) and then click Options
    2. Select the Privacy panel.
    3. Set Firefox will: to Use custom settings for history. Custom History - Windows
    4. Check the box for Clear history when Firefox closes. History Win4
    5. To specify what types of history should be cleared, click the Settings... button next to Clear history when Firefox closes.
    6. In the Settings for Clearing History window, check the items that you want to have cleared automatically each time you quit Firefox.
      History Win5
    7. After selecting the history to be cleared, click OK to close the Settings for Clearing History window.
    8. Click OK to close the Options window
    Google Chrome

    To delete history on one button click

    to clear your history, you can bring up the "Clear Browsing Data" window by hitting Ctrl + Shift + Delete. If you want to take the scenic route, go to Tools > Options > Under the Hood > Clear browsing data.

    200 Ways To Recover Revive Your Hard Drive


    Download:
    http://hotfile.com/dl/20754394/9a67cd1/200Ways.rar.html

    How to protect DVD/CD or USB Memory Stick by Password ?

    Master Voyager is especially designed to create protected DVD/CD discs and USB Memory Sticks. It creates protected areas on the media and it is needed to enter password to see protected contents. Protected Disc/USB Stick is fully autonomous and does not need any special software installed on computer.


    * Strong encryption of protected contents. Advanced Encryption Standard 256 bit is used to protect your records. AES is new Federal Information Processing Standard (FIPS) and used to protect sensitive information by U.S.Government organizations (and others).

    * No need to have Master Voyager software on computer to read protected media. Every protected disc/usb stick contains AutoPlay module. You just need to insert disc into CD Drive (or connect your Flash Stick to USB port) and it will ask password to continue. The only requirement is to have Windows Vista/XP/2000 (32 or 64 bit) and CDROM/USB port. The protected media does NOT install any software to the target computer. It is fully autonomous.

    * You do not need to wait until large amount of data will be decrypted to the computer from protected media. Master Voyager utilizes special on-the-fly decryption technology used in our CryptoExpert Professional software. You just enter password and protected areas become visible as virtual hard drives like E:, G:, Z: etc. Just eject disc from CD Drive and all virtual drives will disappear from system. On the fly decryption technology allows to store movies/executable files/audio files inside the protected area.

    Download:
    http://rapidshare.com/files/141541609/masger.rar
    http://rapidshare.com/files/164637764/masger_crack.rar

    Wednesday 28 September 2011

    LG P500 OPTIMUS ONE

    LG P500 OPTIMUS ONE

    The Optimus One with Google belongs to the family of entry level touch screen smart phones and has been manufactured by LG Electronics, Inc. Initially released working with Android 2.2 Froyo software stack, LG campaign to liberate software to promote the several variants to Android 2.3 Gingerbread. Though, the essential corporal form aspect of every variant is similar, the variation have dissimilarity in tough key shape and outline, the shape of the metal side bezel and the consumer interfaces supplemented by LG or different carriers. Edition of the Optimus One survive that function on diverse frequency bands and both GSM or CDMA-based system protocols.

    LG Optimus One P500 is a Bar handset that weighs around 129g. Its dimensions are 113.5MM x 59MM x 13.3MM. This LG mobile phone provides you with the talk time of up to 15 hours. The phone functions at the frequencies of GSM 850 / 900 / 1800 / 1900 / HSDPA 900 / 2100 MHz. And it comes with the display of 3.2 inches TFT capacitive touch screen, 256K colors. 3 Mega Pixels Camera along with Auto Focus, Digital Zoom makes this phone a good combination.

    These days’ Android devices are becoming actually affordable, what is getting difficult is making the choice. But LG P500 Optimus One price that counts really low doesn’t mean that you’ll constantly get the finest functionality for your money. Thus obviously when the LG P500 aka Optimus One with its slick and stylish look, you can just check it without going for the phrase of judging the book with its cover. Just take a closer look at it and read up the LG P500 Optimus One reviews and decide on your own.

    The phone is really sleek and nicely designed, it comes to you neatly packaged within a shield with a rubberized covering that build it easy to hold and very relaxed to hold. The 3.2-inch capacitive touch screen proves to be receptive and trouble-free for the eyes with its 320 x 480 pixel resolution that show off 256 colors. The light sensor didn’t appear to be too responsive to altering light situations as it took a single minute too long towards switching on the light if the handset is moved away from the head.

    LG’s button position is spot on and construct for extremely easy control and handling. Slim zoom / volume keys are positioned on the right and combine wholly into the chrome edge around the machine. The micro USB port for charging PC connectivity is positioned at the foot while the 3.5mm hands free opening is at the peak near the screen /power lock button. A Micro SD supporting 32GB hot swap gap is situated immediately beneath the rear panel and not tough to find it if you want to.

    Apple iOS: Troubleshooting Wi-Fi networks and connections

    Symptoms

    When using a Wi-Fi network with your iPhone, iPad, or iPod touch, you may occasionally encounter the following issues:

    Unable to locate or join a nearby Wi-Fi network
    Weak or low Wi-Fi signal strength
    Connected to Wi-Fi network, but unable to access the Internet

    This article outlines basic troubleshooting tips and techniques for Wi-Fi on your iOS device. For information on enabling or configuring a Wi-Fi connection, see the User Guide for your product.

    Note: iOS devices sold in China may use the term Wireless LAN (WLAN) instead of Wi-Fi. Not all China iPhone models support WLAN; see this article for more information.
    Products Affected

    iPhone, iPad, iPod touch
    Resolution

    Many Wi-Fi issues can be resolved by doing the following:
    Basic troubleshooting

    Tap Settings > Wi-Fi and turn Wi-Fi off and then on again.
    Verify that you are in range of your Wi-Fi router or base station.
    Confirm that your Wi-Fi router and Cable/DSL modem are connected to power and turned on.
    Check whether other devices (portable computers, for example) are able to connect to the Wi-Fi network and access the Internet.
    Update your Wi-Fi router to the latest firmware.
    For AirPort Base Stations, refer to this article for information about firmware updates. For third-party Wi-Fi routers, check the manufacturer's website for details on updating your firmware.
    Restart your iOS device
    Hold the On/Off button until "slide to power off" appears. Slide to power off your device. When it is off, press the On/Off button to turn it back on.

    If you are still experiencing a Wi-Fi issue after trying the above, choose the symptom below that closely matches your issue:
    If you're unable to locate or join a nearby Wi-Fi network
    After joining a Wi-Fi network, you notice the signal strength is weak or fluctuates
    If you are unable to access the Internet while connected to a Wi-Fi network
    Additional Information

    If you are using a Wi-Fi router at home, refer to your user manual/documentation to assist you with some of these suggestions.

    Check the manufacturer's website for firmware or software updates for your Wi-Fi router.
    Check the wireless security option of your Wi-Fi router:
    If you are using WEP security and have multiple WEP keys on your Wi-Fi router, try configuring your Wi-Fi router to use only a single WEP key in key index 1.
    Consider using WPA or WPA2 instead. WPA and WPA2 encryption protocols are newer, more effective security options for wireless networks than the older WEP protocol.
    Temporarily disable wireless encryption or security on the Wi-Fi router to rule out encryption issues.
    Disable 40MHz in the 2.4GHz settings on the Wi-Fi router. Mac computers, iPhone, iPad, and iPod touch do not support this mode. Disabling it may reduce interference issues.
    Supported Wi-Fi networks vary by iPhone, iPad, iPod touch model (Example: Does my device support 802.11n?). Refer to Tech Specs for detailed information on which standards your device supports.

    Tuesday 27 September 2011

    AVG Anti-Virus Free Edition 2011


    DID YOUR TRIAL VERSION OF THE SOFTWARE JUST EXPIRE? DON'T WANT TO SPEND YOUR HARD EARNED MONEY TO BUY THE FULL VERSION? HERE'S HOW YOU DO IT

    YOUR UNINSTALLER 2011 DELETES ALL YOU REGISTRY FILES, ENABLING YOU TO DOWNLOAD THE FREE VERSION AGAIN AND AGAIN EVERY TIME IT EXPIRES.   

    Your PC still troubling you? Ask any of your queries and we GUARANTEE you a POSITIVE feedback within the next 48HRS.



    Gadgets you may see soon in future




    The world’s economies are still in major turmoil, and it does not look as though there is going to be a quick and painless solution in sight anytime soon. Well, this is the result of spending for so many decades without closing in the gap on the deficit for the majority of countries out there. Having said that, the cost of living looks set to increase all the time, and transportation costs do not look likely to drop, either. You might be able to own a car now, but can you afford the fuel?
    Hybrid cars as well as electric vehicles could very well be the future so that we will be less dependent on the reserves of ‘black gold’ that are sitting underneath most countries in the Middle East. Opel certainly knows this, which is why they intend to shape the future with their version of an electric car, which is the One Euro. This particular model will be able to seat two (it definitely looks sleek enough to impress more than a single date, especially when you take this for a cruise down the hottest stretch in town on a Saturday night), but it won’t be able to go fast mind you.

    How to install Windows 7. Full tutorial (HD)



    Sunday 25 September 2011

    Piracy May Kill Android


    Android operating system is present on almost every smartphone today, but the welfare of this business is threatened by the stringent problems piracy causes.
    Android’s applications are open-source and thanks to its loose authentication instruments piracy began taking its toll. The research was carried out by the Yankee Group, location-based services and software provider Skyhook. The results showed that 27% of the Android developers think piracy has become a real problem for the market. Over 75% of them claimed it was very easy to copy and republish an Android application, leave alone pirate forums facilitating this activity. Such behavior has caused a shift in the industry business model, because a lot of developers choose to give away their work and profit from in-app purchases or advertisements. That’s why the Android market, which was expected to even overthrow Apple’s App Store in the nearest future, started to fall apart.

    The security experts point out that app piracy is widespread in the mobile phone industry, which means that the industry needs to take an approach that circumvents it entirely. Actually, pirating an Android application is not that difficult, as you only need to download a legal copy of the app, hack its code, modify the source and republish. In most cases, such pirated programs end up in users’ mobile phones, as Android allows to download software from any app store or site.

    Meanwhile, customers often don’t even know that they are purchasing or downloading a pirated version of the app, and therefore developers have to deal with users’ complaints when hacked applications start to fall apart. In addition, piracy also damages developers’ income, because they rely on the public to earn money.

    At the same time, the research mentioned above revealed that Google’s response to piracy differs from what was expected: more than a half of developers believe that the search giant adopted a far too relaxed position in regards to their app market policies. Besides, the developers even asked direct help from Google, but the latter let them down with the results.

    The developers think that Google could mandate a certification and badge program for markets, granting them the right to enforce transactions. Moreover, it can implement payment receipts which can be verified on the Internet, as well as build-in codes making the product harder to be tempered with. None of such steps are believed to be able to considerably reduce developer freedom. However, they can at least make piracy a bit more difficult.

    Gameloft HD Games And Files For Android



    Gameloft HD Games And Files For Android

    Gameloft HD Games And Files For Android | 3.42 GB 


    Download Provider - Heroturko.com


    Nova, Nova 2, Modern Combat, Avatar, Eternal Legacy, Fast 5, Sacred Oddesy, Spiderman, Starfront, Shadow Guardian...
    unrar (actual size = 6.19 gb)
    Copy gameloft folder to sd card.
    Install games from game files.
    Play games.
    (Note....these are the official files from Gameloft (both installation files and game folder
    files are original and unmodified...)
    Tested and confirmed on Moto Droid X running rooted gingerbread.

    WARNING!! Nova 2 works fine under gingerbread....Nova 1 only seems to work under froyo without glitches and gameloft won\\\\\\\'t fix the issue.
    All other games work fine though so far as I can tell. Please leave a
    comment/message to me if you have any problems and hopefully I can fix them.

    YARRG!! Piracy be not a crime...it be a skill and a privilege, so seed ye scurvy dogs...seed and ye shall be rewarded with the treasure of speed! Yarrgh!



    Gameloft HD Games And Files For Android
    FILESONIC.com
    Buy Premium Before Download To Get Resumable Support & Max Speed


    WUPLOAD.com
    Buy Premium Before Download To Get Resumable Support & Max Speed