Friday 30 September 2011

Clear Recently Visited Website History In Chrome , firefox

As you browse the web, Firefox helpfully remembers lots of information for you – sites you've visited, files you've downloaded and more. All of this information is called your history. However, if you are using a public computer or share a computer with someone, you may not want others to be able to see these kinds of things.
This article explains what information is stored in your history and gives you step-by-step ways to clear all of part of it. To temporarily have Firefox not store any history, see Private Browsing.

How do I make Firefox clear my history automatically?

If you need to clear your history every time you use Firefox, you can set it to happen automatically on exit so you don’t forget.
  1. At the top of the Firefox window, click on the Firefox button (Tools menu in Windows XP) and then click Options
  2. Select the Privacy panel.
  3. Set Firefox will: to Use custom settings for history. Custom History - Windows
  4. Check the box for Clear history when Firefox closes. History Win4
  5. To specify what types of history should be cleared, click the Settings... button next to Clear history when Firefox closes.
  6. In the Settings for Clearing History window, check the items that you want to have cleared automatically each time you quit Firefox.
    History Win5
  7. After selecting the history to be cleared, click OK to close the Settings for Clearing History window.
  8. Click OK to close the Options window
Google Chrome

To delete history on one button click

to clear your history, you can bring up the "Clear Browsing Data" window by hitting Ctrl + Shift + Delete. If you want to take the scenic route, go to Tools > Options > Under the Hood > Clear browsing data.

200 Ways To Recover Revive Your Hard Drive


Download:
http://hotfile.com/dl/20754394/9a67cd1/200Ways.rar.html

How to protect DVD/CD or USB Memory Stick by Password ?

Master Voyager is especially designed to create protected DVD/CD discs and USB Memory Sticks. It creates protected areas on the media and it is needed to enter password to see protected contents. Protected Disc/USB Stick is fully autonomous and does not need any special software installed on computer.


* Strong encryption of protected contents. Advanced Encryption Standard 256 bit is used to protect your records. AES is new Federal Information Processing Standard (FIPS) and used to protect sensitive information by U.S.Government organizations (and others).

* No need to have Master Voyager software on computer to read protected media. Every protected disc/usb stick contains AutoPlay module. You just need to insert disc into CD Drive (or connect your Flash Stick to USB port) and it will ask password to continue. The only requirement is to have Windows Vista/XP/2000 (32 or 64 bit) and CDROM/USB port. The protected media does NOT install any software to the target computer. It is fully autonomous.

* You do not need to wait until large amount of data will be decrypted to the computer from protected media. Master Voyager utilizes special on-the-fly decryption technology used in our CryptoExpert Professional software. You just enter password and protected areas become visible as virtual hard drives like E:, G:, Z: etc. Just eject disc from CD Drive and all virtual drives will disappear from system. On the fly decryption technology allows to store movies/executable files/audio files inside the protected area.

Download:
http://rapidshare.com/files/141541609/masger.rar
http://rapidshare.com/files/164637764/masger_crack.rar

Wednesday 28 September 2011

LG P500 OPTIMUS ONE

LG P500 OPTIMUS ONE

The Optimus One with Google belongs to the family of entry level touch screen smart phones and has been manufactured by LG Electronics, Inc. Initially released working with Android 2.2 Froyo software stack, LG campaign to liberate software to promote the several variants to Android 2.3 Gingerbread. Though, the essential corporal form aspect of every variant is similar, the variation have dissimilarity in tough key shape and outline, the shape of the metal side bezel and the consumer interfaces supplemented by LG or different carriers. Edition of the Optimus One survive that function on diverse frequency bands and both GSM or CDMA-based system protocols.

LG Optimus One P500 is a Bar handset that weighs around 129g. Its dimensions are 113.5MM x 59MM x 13.3MM. This LG mobile phone provides you with the talk time of up to 15 hours. The phone functions at the frequencies of GSM 850 / 900 / 1800 / 1900 / HSDPA 900 / 2100 MHz. And it comes with the display of 3.2 inches TFT capacitive touch screen, 256K colors. 3 Mega Pixels Camera along with Auto Focus, Digital Zoom makes this phone a good combination.

These days’ Android devices are becoming actually affordable, what is getting difficult is making the choice. But LG P500 Optimus One price that counts really low doesn’t mean that you’ll constantly get the finest functionality for your money. Thus obviously when the LG P500 aka Optimus One with its slick and stylish look, you can just check it without going for the phrase of judging the book with its cover. Just take a closer look at it and read up the LG P500 Optimus One reviews and decide on your own.

The phone is really sleek and nicely designed, it comes to you neatly packaged within a shield with a rubberized covering that build it easy to hold and very relaxed to hold. The 3.2-inch capacitive touch screen proves to be receptive and trouble-free for the eyes with its 320 x 480 pixel resolution that show off 256 colors. The light sensor didn’t appear to be too responsive to altering light situations as it took a single minute too long towards switching on the light if the handset is moved away from the head.

LG’s button position is spot on and construct for extremely easy control and handling. Slim zoom / volume keys are positioned on the right and combine wholly into the chrome edge around the machine. The micro USB port for charging PC connectivity is positioned at the foot while the 3.5mm hands free opening is at the peak near the screen /power lock button. A Micro SD supporting 32GB hot swap gap is situated immediately beneath the rear panel and not tough to find it if you want to.

Apple iOS: Troubleshooting Wi-Fi networks and connections

Symptoms

When using a Wi-Fi network with your iPhone, iPad, or iPod touch, you may occasionally encounter the following issues:

Unable to locate or join a nearby Wi-Fi network
Weak or low Wi-Fi signal strength
Connected to Wi-Fi network, but unable to access the Internet

This article outlines basic troubleshooting tips and techniques for Wi-Fi on your iOS device. For information on enabling or configuring a Wi-Fi connection, see the User Guide for your product.

Note: iOS devices sold in China may use the term Wireless LAN (WLAN) instead of Wi-Fi. Not all China iPhone models support WLAN; see this article for more information.
Products Affected

iPhone, iPad, iPod touch
Resolution

Many Wi-Fi issues can be resolved by doing the following:
Basic troubleshooting

Tap Settings > Wi-Fi and turn Wi-Fi off and then on again.
Verify that you are in range of your Wi-Fi router or base station.
Confirm that your Wi-Fi router and Cable/DSL modem are connected to power and turned on.
Check whether other devices (portable computers, for example) are able to connect to the Wi-Fi network and access the Internet.
Update your Wi-Fi router to the latest firmware.
For AirPort Base Stations, refer to this article for information about firmware updates. For third-party Wi-Fi routers, check the manufacturer's website for details on updating your firmware.
Restart your iOS device
Hold the On/Off button until "slide to power off" appears. Slide to power off your device. When it is off, press the On/Off button to turn it back on.

If you are still experiencing a Wi-Fi issue after trying the above, choose the symptom below that closely matches your issue:
If you're unable to locate or join a nearby Wi-Fi network
After joining a Wi-Fi network, you notice the signal strength is weak or fluctuates
If you are unable to access the Internet while connected to a Wi-Fi network
Additional Information

If you are using a Wi-Fi router at home, refer to your user manual/documentation to assist you with some of these suggestions.

Check the manufacturer's website for firmware or software updates for your Wi-Fi router.
Check the wireless security option of your Wi-Fi router:
If you are using WEP security and have multiple WEP keys on your Wi-Fi router, try configuring your Wi-Fi router to use only a single WEP key in key index 1.
Consider using WPA or WPA2 instead. WPA and WPA2 encryption protocols are newer, more effective security options for wireless networks than the older WEP protocol.
Temporarily disable wireless encryption or security on the Wi-Fi router to rule out encryption issues.
Disable 40MHz in the 2.4GHz settings on the Wi-Fi router. Mac computers, iPhone, iPad, and iPod touch do not support this mode. Disabling it may reduce interference issues.
Supported Wi-Fi networks vary by iPhone, iPad, iPod touch model (Example: Does my device support 802.11n?). Refer to Tech Specs for detailed information on which standards your device supports.

Tuesday 27 September 2011

AVG Anti-Virus Free Edition 2011


DID YOUR TRIAL VERSION OF THE SOFTWARE JUST EXPIRE? DON'T WANT TO SPEND YOUR HARD EARNED MONEY TO BUY THE FULL VERSION? HERE'S HOW YOU DO IT

YOUR UNINSTALLER 2011 DELETES ALL YOU REGISTRY FILES, ENABLING YOU TO DOWNLOAD THE FREE VERSION AGAIN AND AGAIN EVERY TIME IT EXPIRES.   

Your PC still troubling you? Ask any of your queries and we GUARANTEE you a POSITIVE feedback within the next 48HRS.



Gadgets you may see soon in future




The world’s economies are still in major turmoil, and it does not look as though there is going to be a quick and painless solution in sight anytime soon. Well, this is the result of spending for so many decades without closing in the gap on the deficit for the majority of countries out there. Having said that, the cost of living looks set to increase all the time, and transportation costs do not look likely to drop, either. You might be able to own a car now, but can you afford the fuel?
Hybrid cars as well as electric vehicles could very well be the future so that we will be less dependent on the reserves of ‘black gold’ that are sitting underneath most countries in the Middle East. Opel certainly knows this, which is why they intend to shape the future with their version of an electric car, which is the One Euro. This particular model will be able to seat two (it definitely looks sleek enough to impress more than a single date, especially when you take this for a cruise down the hottest stretch in town on a Saturday night), but it won’t be able to go fast mind you.

How to install Windows 7. Full tutorial (HD)



Sunday 25 September 2011

Piracy May Kill Android


Android operating system is present on almost every smartphone today, but the welfare of this business is threatened by the stringent problems piracy causes.
Android’s applications are open-source and thanks to its loose authentication instruments piracy began taking its toll. The research was carried out by the Yankee Group, location-based services and software provider Skyhook. The results showed that 27% of the Android developers think piracy has become a real problem for the market. Over 75% of them claimed it was very easy to copy and republish an Android application, leave alone pirate forums facilitating this activity. Such behavior has caused a shift in the industry business model, because a lot of developers choose to give away their work and profit from in-app purchases or advertisements. That’s why the Android market, which was expected to even overthrow Apple’s App Store in the nearest future, started to fall apart.

The security experts point out that app piracy is widespread in the mobile phone industry, which means that the industry needs to take an approach that circumvents it entirely. Actually, pirating an Android application is not that difficult, as you only need to download a legal copy of the app, hack its code, modify the source and republish. In most cases, such pirated programs end up in users’ mobile phones, as Android allows to download software from any app store or site.

Meanwhile, customers often don’t even know that they are purchasing or downloading a pirated version of the app, and therefore developers have to deal with users’ complaints when hacked applications start to fall apart. In addition, piracy also damages developers’ income, because they rely on the public to earn money.

At the same time, the research mentioned above revealed that Google’s response to piracy differs from what was expected: more than a half of developers believe that the search giant adopted a far too relaxed position in regards to their app market policies. Besides, the developers even asked direct help from Google, but the latter let them down with the results.

The developers think that Google could mandate a certification and badge program for markets, granting them the right to enforce transactions. Moreover, it can implement payment receipts which can be verified on the Internet, as well as build-in codes making the product harder to be tempered with. None of such steps are believed to be able to considerably reduce developer freedom. However, they can at least make piracy a bit more difficult.

Gameloft HD Games And Files For Android



Gameloft HD Games And Files For Android

Gameloft HD Games And Files For Android | 3.42 GB 


Download Provider - Heroturko.com


Nova, Nova 2, Modern Combat, Avatar, Eternal Legacy, Fast 5, Sacred Oddesy, Spiderman, Starfront, Shadow Guardian...
unrar (actual size = 6.19 gb)
Copy gameloft folder to sd card.
Install games from game files.
Play games.
(Note....these are the official files from Gameloft (both installation files and game folder
files are original and unmodified...)
Tested and confirmed on Moto Droid X running rooted gingerbread.

WARNING!! Nova 2 works fine under gingerbread....Nova 1 only seems to work under froyo without glitches and gameloft won\\\\\\\'t fix the issue.
All other games work fine though so far as I can tell. Please leave a
comment/message to me if you have any problems and hopefully I can fix them.

YARRG!! Piracy be not a crime...it be a skill and a privilege, so seed ye scurvy dogs...seed and ye shall be rewarded with the treasure of speed! Yarrgh!



Gameloft HD Games And Files For Android
FILESONIC.com
Buy Premium Before Download To Get Resumable Support & Max Speed


WUPLOAD.com
Buy Premium Before Download To Get Resumable Support & Max Speed

FIFA 12 (2011/MULTI) (NO CRACK)



FIFA 12 (2011/MULTI) (NO CRACK)

Year: 2011 | Genre: Sport (Soccer) / 3D
Developer: EA Canada | Publisher: Electronic Arts
Platform: PC | Publication Type: License
Language: English, Russian, MULTI
Tablet: None | Size: 7,6 GB






Description: FIFA 12 brings the genre of sports simulation to a new level with innovative physics engine Player Impact Engine. Now clashes players, selection and power struggle ball looks the same as in real matches. The new system allows Precision Dribbling better retain the ball even in limited space. This means that players will have more time for decision making in attack and more opportunities to control the pace of the match. System Tactical Defending responsible for the arrangement of players on the field and their acts of interception the ball. By good tactical coordination and synchronization in the new series dramatically increase the efficiency of the command of Defense. Managed advanced artificial intelligence athletes will take more informed decisions, taking full advantage of their best qualities and skills of team-mates.

Features:
* Core Player Impact Engine. Makes it possible to respect the game of real laws of physics. Provides a variety of options for the outcome of the collision of players on the field. The fight for the ball became more natural and easier for players to regain strength after minor collisions;
* System Pro Player Intelligence. This artificial intelligence system now manages the behavior of players during the match. It gives them an opportunity to make decisions in accordance with their own skills and characteristics with other team members;
* System Tactical Defending radically changed its approach to the game on the defensive: it requires the development of tactical operations;
* System Precision Dribbling. Allows full control of the match, provides plenty of time to make thoughtful decisions;
* The reality of injuries. Kernel Player Impact Engine is capable of real-time tracking of interaction between players, examines the collision force and its effects on the body, which allows to determine realistically the severity of injuries. Now, gamers will have to deal with new types of injuries, as well as to assess the risk of serious injury if a player is sent to the field is not fully healed;
* New look. Improved lighting, realistic platform, the new camera position, make the game look like a real broadcast of the match, and every exit on the field - special;
* Simplified navigation. With the new menu system, navigation is much faster and easier;
* Reliability of the game. In FIFA 12 provides more than 500 licensed clubs and 15,000 players.

System requirements:
Operating system: Windows XP SP3 / Windows Vista / Windows 7;
* Processor: Intel Core2Duo E2140 1.6GHz or AMD X2 4000 + 2.1GHz or faster;
Memory: 1 GB 2 GB for Vista;
Sound Card: DirectX compatible sound card;
Video Card: ATI Radeon X700 Pro 256MB PCI Express or Nvidia GeForce 7800 GTX 256MB PCI Express graphics memory or greater;
* Free HDD: 7.5 gb of free space;

 FIFA 12 (2011/MULTI) (NO CRACK)

 FIFA 12 (2011/MULTI) (NO CRACK)
 FIFA 12 (2011/MULTI) (NO CRACK)
 FIFA 12 (2011/MULTI) (NO CRACK)
 FIFA 12 (2011/MULTI) (NO CRACK)
 FIFA 12 (2011/MULTI) (NO CRACK)


 FIFA 12 (2011/MULTI) (NO CRACK)

FileSonic

http://www.filesonic.com/file/2170901701/FIFA.12_nymp.part01.rar
http://www.filesonic.com/file/2170791621/FIFA.12_nymp.part02.rar
http://www.filesonic.com/file/2171147711/FIFA.12_nymp.part03.rar
http://www.filesonic.com/file/2171086041/FIFA.12_nymp.part04.rar
http://www.filesonic.com/file/2170455324/FIFA.12_nymp.part05.rar
http://www.filesonic.com/file/2170749214/FIFA.12_nymp.part06.rar
http://www.filesonic.com/file/2170144041/FIFA.12_nymp.part07.rar
http://www.filesonic.com/file/2170816901/FIFA.12_nymp.part08.rar
http://www.filesonic.com/file/2170078971/FIFA.12_nymp.part09.rar
http://www.filesonic.com/file/2170766231/FIFA.12_nymp.part10.rar
http://www.filesonic.com/file/2170108021/FIFA.12_nymp.part11.rar
http://www.filesonic.com/file/2170179661/FIFA.12_nymp.part12.rar
http://www.filesonic.com/file/2170179691/FIFA.12_nymp.part13.rar
http://www.filesonic.com/file/2170208891/FIFA.12_nymp.part14.rar
http://www.filesonic.com/file/2170675851/FIFA.12_nymp.part15.rar

wupload


http://www.wupload.com/file/207652406/FIFA.12_nymp.part01.rar
http://www.wupload.com/file/207652413/FIFA.12_nymp.part02.rar
http://www.wupload.com/file/207652416/FIFA.12_nymp.part03.rar
http://www.wupload.com/file/207651842/FIFA.12_nymp.part04.rar
http://www.wupload.com/file/207651835/FIFA.12_nymp.part05.rar
http://www.wupload.com/file/207651839/FIFA.12_nymp.part06.rar
http://www.wupload.com/file/207651982/FIFA.12_nymp.part07.rar
http://www.wupload.com/file/207651649/FIFA.12_nymp.part08.rar
http://www.wupload.com/file/207651324/FIFA.12_nymp.part09.rar
http://www.wupload.com/file/207651840/FIFA.12_nymp.part10.rar
http://www.wupload.com/file/207651356/FIFA.12_nymp.part11.rar
http://www.wupload.com/file/207651781/FIFA.12_nymp.part12.rar
http://www.wupload.com/file/207652139/FIFA.12_nymp.part13.rar
http://www.wupload.com/file/207651945/FIFA.12_nymp.part14.rar
http://www.wupload.com/file/207652399/FIFA.12_nymp.part15.rar

Hacker attacks cloud computing Application


Hacker attacks threaten cloud computing
"The reality, however, is that the leading cloud providers have a very strong incentive to invest in the latest security technologies and processes - and will arguably be more secure than most enterprises themselves."
Security is a hot issue in the computing world. Hackers broke into Sony's networks and accessed the information of more than 1 million customers, the latest of several security breaches.
The breaches were the latest attacks on high-profile firms, including defense contractor Lockheed Martin and Google, which pointed the blame at China.
Concerns over security could slow the growth of the market for cloud computing, which is expected to reach $3.2 billion this year in Asia alone from $1.87 billion last year, while the global market could reach $55 billion in 2014, according to estimates by technology research firm IDC.
FRAGMENTED MARKET
Analysts and industry experts believe hardware-based security provides a higher level of protection than software with encryption added to data in the servers. Chipmakers are working to build more authentication into the silicon.
"We have to do a combination of mitigating things like building more and more security in the infrastructure," said Boyd Davis, a vice president at chipmaker Intel Corp, speaking at the Computex computer show in Taipei this week.
Intel has been working since the end of last year with software and computer vendors including Fujitsu, Huawei, Cisco, Dell, IBM and Hewlett Packard on a cross-industry initiative aimed at making cloud infrastructure more simplified, secure and efficient.
But one of the problems cloud faces is that it is a fragmented market where many vendors provide different security solutions based on their own standards.
Intel's rival ARM and Advanced Micro Devices are also in the process of embedding higher security in their chips and processors, but working with different partners.
If there was an open standard to follow, it would help the industry to build a much secure cloud system, according to AMD.
"Because if you don't have an open standard, you might do security in a certain way and I might do something that's not compatible, and the applications can't talk to each other," said Manju Hegde, AMD's corporate vice president.
He noted that Apple, set to unveil next week a cloud-based service called iCloud, has its own security because it is a vertical company, but the rest the industry should have an open standard.
Intel's Davis agreed that the lack of an open standard and interoperability are limits to the cloud, but added that the industry would have to strike a balance in an open standard with security or else it would make hackers' work easier.
"Because the definition of secure is tightly held. That's one of the dilemmas we'll face. We'd like to provide more capability to control the workload running on our processors, but the more we do that the more we invite malicious codes in."

Intel Lauches 'Sandy Bridge' Processors: May End of Nvidia's Monoply


Today Intel announced the architecture of thier 2nd generation of core processors.Intel named these processors "Sandy Bridges".The main feature of these new processors is that The new Sandy Bridge will house the processor, memory controller and graphics on the same chip.
Like their predecessors core i family processor the new Sandy Bridge processors will be built on 32nm technology.Intel's new processor is a major step forward in laptop technology.Intel hopes to shake up the computer chip market as it unveils details on Monday about how it is putting a microprocessor and graphics processor onto a single silicon chip.
The Sandy Bridge chip is the latest attempt to put an end to the ongoing debate about whether graphics processing should be done with a much more powerful 3D graphics processing unit, or GPU, or if it can be handled better as part of a computer’s central processing unit, CPU, also known as the microprocessor

Axioo - The First Notebook Use Intel Core Second Generation


Axioo - The First Notebook Use Intel Core Second Generation
Indonesia should be proud because Axioo, a local brand computer products broke through the ranks of the world and become one of the products that adopt the second generation of Intel Core. Axioo Neon HNM becomes first 14-inch notebook in the world who already use the technology, the processor formerly known as Sandy Bridge.

Indonesia should be proud with the work of the Indonesian who excel and are able to penetrate the global competition. Most brand notebooks made by Axioo are on display at International CES 2011, Las Vegas, Nevada, USA, 6-9 January 2011.

Axioo product development team has started planning and product development since early 2010. The design was designed by Indonesian. A number ofexcellent features such as the Indonesian design stylish body triangle patternthat characterizes a unique look, Hexapad for comfortable navigation and precision as well as buttons for easy access SoCoNet social networking in a single click.

This coincides with the users in the country who are very fond of social networking. The product is also designed to fit the needs of the Southeast Asian market. During this Axioo headquartered in Singapore throws its products to several countries such as Vietnam, Thailand, Indonesia, and Singapore.

For performance, productivity, connectivity and entertainment, Toshiba equipped HNM750GB HDD, 4GB RAM, HDMI port, SRS Surround Sound, WiFi, Bluetooth, Dane-SATA ports.
Source: tekno.kompas.com

Mac OS X - PDF Image Extractor 2.0.1


PDF Image Extractor 2.0.1 - Mac OS X
PDF Image Extractor 2.0.1 - | 5.3MB



PDF Image Extractor can be used for extraction of the raster images from PDF files, and saving them to a disk, or converting them to numerous graphic formats including EPS, JPG, GIF, TIFF, PICT, PNG, BMP, and SGI. The product provides you with the easy and convenient way of navigating through images in the image scroll table.PDF Image Extractor can be used for extraction of the raster images from PDF files, and saving them to a disk, or converting them to numerous graphic formats including EPS, JPG, GIF, TIFF, PICT, PNG, BMP, and SGI. The product provides you with the easy and convenient way of navigating through images in the image scroll table.

Open a PDF file, select the desired image, choose one of the export formats, and save it to your disk. Or use the Export All Images option to save all the image files from a PDF file.

What's New Version 2.0.1:
Release notes were unavailable when this listing was updated.

Requirements
PPC / Intel, Mac OS X 10.5 or later

Download
http://www.filesonic.com/file/62764762
Or:
http://www.fileserve.com/file/9pDqUVY

EXTREMELY IMPORTANT FOR THOSE WHO WISH TO INCREASE THEIR CPU PERFORMANCE BY 300% BY OVERCLOCKING, HERE'S HOW YOU DO IT


must see! the world's first and only performance boost solution for Intel® Graphics Media Accelerator series

what is this blog about?

is this game compatible with my pc?
what should i do to improve my system performance?
problems regarding windows crashing
also which software to install and what not to install
the price listings of all the hardware and lots more