Thursday, February 28, 2013

TCP/IP stack repair options for use with Vista or 7. 

Start - All Programs - Accessories and right click on Command Prompt, select "Run as Administrator" to open a command prompt.

Reset WINSOCK entries to installation defaults: netsh winsock reset catalog

Reset IPv4 TCP/IP stack to installation defaults. netsh int ipv4 reset reset.log

Reset IPv6 TCP/IP stack to installation defaults. netsh int ipv6 reset reset.log

Reboot the machine.


TCP/IP stack repair options for use with Windows XP with SP2 or SP3.

Start, Run, CMD, OK to open a command prompt.

Reset WINSOCK entries to installation defaults: netsh winsock reset catalog

Reset TCP/IP stack to installation defaults. netsh int ip reset reset.log

Reboot the machine.
IV B.Tech. I Semester (R05)Results - November, 2012

IV B.Tech. I Semester (R05)Results - November click here
IV B.Tech. I Semester (RR)Results - November, 2012 

IV B.Tech. I Semester (RR)Results - November, 2012 Click here
IV B.Tech. I Semester (R07)Results - November, 2012

IV B.Tech. I Semester (R07)Results - November, 2012 Click here


IV B.Tech. I Semester (R09)Results - November, 2012

IV B.Tech. I Semester (R09)Results - November, 2012 click here


Tuesday, February 26, 2013

How To Run Java Apps and Games on Your Android SmartPhone

All Android users who migrated from Symbian phones always miss their favorite Java and J2ME applications. However, there is a possibility to run the Java application, if you are using Android 1.5 to 2.3. If you want to use Java applications and enjoy Java games on your Android, you can download and install JBED Android Java Emulator. According to XDA developers, you can run any Java games or applications on Android using the JBED. You can download the application free from the given link. JBED is already tested on HTC Wildfire and it is obvious that it will work on other Android devices as well.
JBED is an .apk application that allows you to run .jar and .jad games and application on your Smartphone. You can easily download and install it on your Smartphone to run any Java applications. Andriod phones can be installed with more then 40, 000 Java games and applications using JBED. The application also comes with Android J2ME MIDP runner. In the following steps, I will tell you how to run Java and J2ME applications on your Android phone. Now, you do not have to forget or leave your Java applications that you were using from a long time.
Installation steps:
A. Download JBED for your Android Mobile running on Gingerbread from here.
B. Simply install the Jbed.apk file on your android smartphone.
C. Launch the application and click on SD card from the menu.
D. Choose the JAR file that you want to install and run.
E. Install the Java apps that you want to use.
F. Click on the Java apps that you have installed to run them.
In case the application don’t work you can try downloading JBED.Zip and flash the zip file using CWM or ClockWorkMod.
The app compiles and optimizes the Jar files and asks the user whether he wants to use it or not. It also displays the path of all the Jar files that are compiles in its database for quick access. You can install and run any Java applications following the above steps. If you see some lines or faded screen while installing the JAR files, that means your device is not fully supporting it. Restart your phone and close any other apps, and try again. If the same problem occurs again then please uninstall JBED.
Conclusion
As said earlier, the app enables the Android Smartphone to run many Java games and applications but you can expect some graphical and performance related issues. If the app does not work on your android smartphone you can try rooting your device and reinstalling the app.
Problems ?
If you face any issues or problems with JBED you can post your doubts or suggestions on XDA Forum.
Update : It seems that the app is not working on many android smartphones, we are trying to find an alternative way to run java apps on your android smartphone. We would post about it here as soon as possible.

Saturday, February 23, 2013

How to use pendrive as ram memory in windows 7

 Hi friends, Windows 7 and Windows vista comes with a ready boost option. Q-What is ready boost
Ans- "ReadyBoost is a disk cache component of Microsoft Windows, first introduced with Microsoft's Windows Vista in 2006 and bundled with Windows 7 in 2009. It works by usingflash memory, a USB flash driveSD cardCompactFlash,external hard drive or any kind of portable flash mass storage system as a cache. ReadyBoost is also used to facilitateSuperFetch, which allows it to perform analysis of boot-time disk usage patterns and creates a cache which is used in subsequent system boots." Source
If you are using a high configuration PC, It doesn't show any effect on speed because if you are a normal user I think only a few times you use your full ram memory but if you are using an old pc with low ram memory(Like 512 MB or IGB) and harddisk & using vista or 7. It speed up your PC and you will see the result, reduced application data loading time, reduced shutdown and restart time and many more you can't imagine without High ram memory. How to use this feature
Plug in your pendrive-> Format with NTFS or FAT32
Now go to properties->Select ReadyBoost
Check Use this device->Choose maximum space to reserve system speed
Click on Apply and OK. Your readyboost PenDrive is ready Now to Use.
Here is an personal suggestion HP and Sandisk is the Best for this work so what are you waiting for.


Friday, February 22, 2013


Image
Second generation Intel Core Processors offer significant advantages over their first generation predecessors, producing improved speed, optimisation and new graphical and multi task features for their i3, i5, and i7 models.
From a new micro-architecture through to increased graphical integration and exclusive entertainment features, they provide an excellent boost to the it equipment foundation of home and business laptops. Significantly boosting daily performance, they also provide added durability for video gaming and business tasks.

Processor Features

Introduced in 2011, the second generation processors shifted from a first generation Nehalem to a Sandy Bridge platform. The latter features a 32 nm micro-architecture that is 69% faster than the first generation processors. Intel’s new line builds around 20 new processors ranging from dual core i3 to quad core i5s and i7s. The three types of processor retain basic differences in speed, optimization, battery life and the ability to handle multiple tasks.

i3 to i7 models

The i3 is recommended for entry level computer users, the i5 for mainstream use, and the i7 for professional, high end performance. While all types can handle the graphics functions of a processor, they differ in terms of the size of their caches in ascending order from i3 to i7, while i3 processors do not support Turbo charging.
Significant differences
The second generation models most significantly differ from earlier generations through their integration of the CPU and the graphics card, usually separated within a mother board. This allows for a much faster integration of computer speed and graphics for video playback and games, with content generation up by 42% from earlier models.
This in turn allows the processors to better handle a range of high-quality graphics features, from Intel InTru 3D and Clear Video HD, to improved Quick Sync Video for converting files, and WiDi 2.0 wireless streaming of computer content onto television sets. These features produce excellent running speeds and graphical detail for video games and for users wanting to navigate multiple applications.
The i3s and the i7s also retain their ability to hyper thread from earlier models, where two cores enable improved performance for simultaneous applications. This is particularly important for optimizing a range of applications, and is emulated by the four core structure of the i5 processors.
The other new improvement on the older generation of processors include Intel Insider chips, which allow you to legally stream entertainment content in HD, while protecting against piracy through DRM software. 

Applications

The combined value of the new processors is to significantly increase computer, laptop, tablet and notebook performance. Better multi-tasking capabilities make them particularly ideal for heavy use business brands like lenovo laptops and tablet ranges, with recent models such as the ThinkPad T420 and the ThinkPad X220 Tablet making use of the processors to offer faster speeds, and better safety.
The second generation processors are also set to receive new upgrades in 2012 through a shift from Sandy Bridge to Ivy Bridge micro-architectures, which promise 30% increases in graphics performance, and a new 3D gate and 22 nm structure that can increase CPU performance by 20%.
However, for current models the second-generation range offers extensive benefits, with most models employing the i5 processor as a middle ground between the economy of the i3 and the high intensity performance capability of the i7 variants.

SUMMARY:
Image

The term Generation is loosely applied to Intel processors to mean new and significant developments in processor architecture or functions.
A second generation Core processor is the family of processors known as Sandy Bridge, which among other things introduced shared cache and placed the memory controller, graphics and CPU on the same die. The first generation was composed the Core i3, i5 and i7 processors launched early last year.
The term can also be seen sometimes applied to processor families. The Core family of processors can sometimes be talked about as having had 3 generations (Lyndfield, Clarkdale and Sandy Bridge). But some processors like the i7, had more or different families (the Bloomfield and Gulftown). Example.
It can also be used to name different factory models within a similar architecture. Again, sticking to Core processors, The Core 2 Duo, Quad and Extreme being mentioned as one generation different than the i3, i5 and i7, while the sandy Bridge being the 3rd generation of Core processors. Example
All in all the term is not officially connoted to the media. Intel does seem to favor the term as meaning significant architecture and factory processing changes within the same family of processors. And they are ultimately the ones deciding what is named 2nd, 3rd, 4th and so on generation. They do it often. But the term has come to mean other things too, since Intel itself has never tried to enforce it. Hence being a term that can have both official and loose connotations, depending on the context.

In 2010, the 1st generation of processors was introduced. This generation included the Core13, eight Core i5’s, and five Core i7 models.  However, Intel’s second generation contains desktop processors, 29 new mobile processors; they were introduced in 2011. These processors were based on Intel’s Sandy Bridge architecture.
1st Generation Intel Core Processors
In 2010 Intel introduced their three models of Core I processor series. The Core i3 is the low end processor and the lowest. The desktop and mobile versions of these processors have dual core technology and Intel hyper-threading support. The Core i3 do not have the Intel turbo boost support. The Core i5 has both dual and quad processors and Core i5 comes with at least two of its processors the supports the Intel Turbo Boost, graphic designs and Hyper-Threading. The Core i7 are the most powerful processors. It has four processors that support Hyper Threading, and Turbo boost. The mobile C i7 processors have both quad and dual cores. The C i7 is the highest price and most costly processor in the Core family.
2nd Generation Intel Core Processors
The second generation of core processors by Intel was first introduced in 2011 and it contains about 29 mobile and desktop processors, which were manufactured by Sandy Bridge architecture.  This family of processors was based on the 32nm microarchitecture by Intel, and was the first to integrate the processor and memory controller graphics on the same die. The 2nd generation processors include video performing encoding hardware, and a Video HD and 3D stereoscopic content for TV viewing, and support of full streaming HD. The family of Cores contains 1 Core i7 extreme edition, 12 Core i7’s, 12 Core i5’s, 4 Core i3 processors, and several new graphic performance features.
Time Tables for Annual Exams 

AP SSC Exam time table 2013 
 Click here to download 
AP intermediate 1st year time table for annual exam 2013
 click here to download
AP Intermediate 2nd year time table for annual exam 2013
Click here to download


KU Degree Annual Exams Time Table 2013 | KU B.A., B.Com., B.Sc., BBM Annual Exams Time Table 2013 | KU Degree Exams 2013 Hall Tickets Info


2013 time table for degree annual exam click here to download 

Wednesday, February 20, 2013

10 Tips to Boost Your Interview Skills

 

Even the smartest and most qualified job seekers need to prepare for job interviews. Why, you ask? Interviewing is a learned skill, and there are no second chances to make a great first impression. So study these 10 strategies to enhance your interview skills. 


Practice Good Nonverbal Communication

It's about demonstrating confidence: standing straight, making eye contact and connecting with a firm handshake. That first nonverbal impression can be a great beginning -- or quick ending -- to your interview.

Dress for the Job or Company

Today's casual dress codes do not give you permission to dress as "they" do when you interview. It is important to know what to wear to an interview and to be well-groomed. Whether you wear a suit or something less formal depends on the company culture and the position you are seeking. If possible, call to find out about the company dress code before the interview.

Listen

From the very beginning of the interview, your interviewer is giving you information, either directly or indirectly. If you are not hearing it, you are missing a major opportunity. Good communication skills include listening and letting the person know you heard what was said. Observe your interviewer, and match that style and pace.

Don't Talk Too Much
Telling the interviewer more than he needs to know could be a fatal mistake. When you have not prepared ahead of time, you may ramble when answering interview questions, sometimes talking yourself right out of the job. Prepare for the interview by reading through the job posting, matching your skills with the position's requirements and relating only that information.

Don't Be Too Familiar
The interview is a professional meeting to talk business. This is not about making a new friend. Your level of familiarity should mimic the interviewer's demeanor. It is important to bring energy and enthusiasm to the interview and to ask questions, but do not overstep your place as a candidate looking for a job.

Use Appropriate Language

It's a given that you should use professional language during the interview. Be aware of any inappropriate slang words or references to age, race, religion, politics or sexual orientation -- these topics could send you out the door very quickly.

Don't Be Cocky

Attitude plays a key role in your interview success. There is a fine balance between confidence, professionalism and modesty. Even if you're putting on a performance to demonstrate your ability, overconfidence is as bad, if not worse, as being too reserved.

Take Care to Answer the Questions

When interviewers ask for an example of a time when you did something, they are asking behavioral interview questions, which are designed to elicit a sample of your past behavior. If you fail to relate a specific example, you not only don't answer the question, but you also miss an opportunity to prove your ability and talk about your skills.

Ask Questions

When asked if they have any questions, most candidates answer, "No." Wrong answer. Part of knowing how to interview is being ready to ask questions that demonstrate an interest in what goes on in the company. Asking questions also gives you the opportunity to find out if this is the right place for you. The best questions come from listening to what you're asked during the interview and asking for additional information.

Don't Appear Desperate

When you interview with the "please, please hire me" approach, you appear desperate and less confident. Reflect the three Cs during the interview: cool, calm and confidence. You know you can do the job; make sure the interviewer believes you can, too.

Happy Birthday Cakes - Beautiful Cakes



happy birthday chocolate cake

happy birthday vanilla cake 
 
 Happy Birthday strawberry cakes 



Sample CV in English

How to Write Resume click here to download instructions

Tuesday, February 19, 2013


In Windows XP, use the following steps to reset the Internet Protocol: 
1. Click Start 
2. Click Run 
3. Type cmd 
4. Click Ok 
5. In the Black Command Box Type: netsh int ip reset c:\resetlog.txt 
6. Hit Enter Key 
7. Restart the computer and try to log in and browse the Internet. If the problem persists, continue using these steps. 
8. Click Start 
9. Click Run 
10. Type cmd 
11. Click Ok 
12. In Black Command Box Type: netsh winsock reset 
13. Hit Enter Key 
14. Restart Computer 
Also Try Resetting IE8 to Default Options 
Click Tools Tab 
Click Internet Options at bottom 
Click Advanced Tab on far right 
Click Reset near bottom 
Click Ok and Close Internet Explorer 8 
Restart Internet Explorer 8

Monday, February 18, 2013

1st Year2011 Feb 2nd MID Exams Bit Papers/Question Papers

*> COMPUTER PROGRAMMING & DATA STRUCTURES Click here to download and key

*>MATHEMATICS-I  Click here to download and key

*>ENGLISH Click here to download and key

Sunday, February 17, 2013


Wifi Password Hack V2.1

.
What is Wifi?
Wi-Fi  is a popular technology that allows an electronic device to exchange data wirelessly (using radio waves) over a computer network, including high-speed Internet connections.
The Wi-Fi Alliance defines Wi-Fi as any “wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers’ (IEEE) 802.11 standards”.However, since most modern WLANs are based on these standards, the term “Wi-Fi” is used in general English as a synonym for “WLAN”.
WIifi Password Hack is one tool that help you to find all password for any wireless network on your range. Its the most popular tool online!
This tool can be download only 3000 times:

Downloads: 2167

.
Counter is updated every 24 hours..
.
 What is Wifi Password Hack v2.1?
With our tool, you can find all Wireless networks in range and with a simple click its show all passwords.
Virus scan :
Screen Shot:
Download Now For Free.

Click on the Wireless link in the left pane now as shown below:-
I have actually missed a screenshot here.  In the right pane, when you click 'wireless',  you will see something like SSID.  Change the SSID to somename (any name of your choice).    You can use any name.  This is actually to identify your wireless network if you have some other networks existing in your premises.  I have just used 'somename' as the SSID.  It is your choice to keep any name.   And then when you click on the link 'Security' in right pane, you will see the following page coming up:-  
It is all over now.
All that you need to do is to configure your LAN card to Obtain IP address automaticallyand Obtain DNS address automatically and open your farourite browser to browse the internet.  You will have to redo what you did in the first screenshot of this page except instead of assigning an IP address you should choose Obtain IP automatically and obtain DNS automatically..

IBM Rational Rose Enterprise
IBM Rational Rose Enterprise
English | IBM Rational Rose Enterprise | 1.23 GB
Mirrors: RapidGator | Extabit | Lumfile


IBM Rational Rose - is one of the most feature-rich family of products, Rational Rose. All products Rational Rose support the language Unified Modeling Language (UML); however, these products are different implementation technologies they support.
Rational Rose Enterprise - is the best simulation environment that supports code generation from models written in Ada, ANSI C + +, C + +, CORBA, Java/J2EE, Visual C + + and Visual Basic. Like all family products Rational Rose, it provides a common modeling language, allowing the creation of quality software.

DOWNLOAD HERE(extabit):
http://extabit.com/file/29zfogabwh4be/IBM Rational Rose Enterprise.part1.rar
http://extabit.com/file/29zfogabwguxm/IBM Rational Rose Enterprise.part2.rar
http://extabit.com/file/29zfogabwgrpm/IBM Rational Rose Enterprise.part3.rar
http://extabit.com/file/29zfogabvu4e2/IBM Rational Rose Enterprise.part4.rar

Mirror (lumfile):
http://lumfile.com/uw7r912v0l7o/IBM_Rational_Rose_Enterprise.part1.rar.html
http://lumfile.com/vpepn5blwak4/IBM_Rational_Rose_Enterprise.part2.rar.html
http://lumfile.com/sjtrndev077u/IBM_Rational_Rose_Enterprise.part3.rar.html
http://lumfile.com/1rivb57mv60q/IBM_Rational_Rose_Enterprise.part4.rar.html

Mirror (rapidgator):
http://rapidgator.net/file/49805636/IBM_Rational_Rose_Enterprise.part1.rar.html
http://rapidgator.net/file/49805684/IBM_Rational_Rose_Enterprise.part2.rar.html
http://rapidgator.net/file/49805633/IBM_Rational_Rose_Enterprise.part3.rar.html
http://rapidgator.net/file/49805427/IBM_Rational_Rose_Enterprise.part4.rar.html

Saturday, February 16, 2013


Even though Disk Cleanup is not a very often used tool in Windows, it still does come in handy and I have found that it does a good job of getting rid of some stuff that other cleaners can’t. In Windows 8, you can open Disk Cleanup in a number of ways. In this post, I’ll walk you through the different ways to get to Disk Cleanup.
windows 8 disk cleanup

Disk Cleanup via Administrative Tools

The first way to get to Disk Cleanup is to go to the Control Panel and then open Administrative Tools and click on Disk Cleanup. Pretty straight-forward, but kind of a tedious process.
adminitrative tools
You can read my previous post on how to open the Control Panel in Windows 8 if you’re having trouble doing that.

Disk Cleanup via Search Charm

The easiest way to open Disk Cleanup is to open the Charms bar and then click on Search.  Type in Disk Cleanup and then click on Settings.
free up disk space
Click on Free up disk space by deleting unnecessary files. This will bring up Disk Cleanup.

Disk Cleanup via Run Dialog

Another way to do this is to open a run dialog and type in the direct executable for disk cleanup. Go to the Start Screen, right-click and choose All apps at the bottom. Scroll to the right and then click on Run. Type in Cleanmgr.exe.
cleanmgr exe

Pin to Start Screen

If you really use it a lot, you can right-click on Disk Cleanup in Administrative Tools and choose Pin to Start or Pin to Taskbar.
pin disk cleanup

Show Administrative Tools

Lastly, if you use a lot of the tools under Administrative Tools, you can add them all to the Start Screen and All apps list by going to the Start Screen, opening the Charms bar, clicking on Settings and then clicking on Tiles.
tiles settings
Under Show administrative tools, go ahead and switch the bar to Yes.
show admin tools
Now all the Administrative Tools, including Disk Cleanup, will show up on the Start Screen and on the All apps list.
start screen tools
all apps tools
That’s about it! There are many ways to get to settings and apps in Windows 8, so feel free to customize it to the way you like. Enjoy!
When you're using a pen drive to transfer data between PCs, the common problem is viruses. You might format your pen drive many times because of viruses. Some kind of viruses never get delete by normal formatting. Are you disappointed of the result that you get after formatting your pen drive and still find viruses in it?

Here I'll give you a solution to format your USB pen drive completely.

You can format pen drives using command prompt to remove all the virus files permanently. Most of the times these type of formats delete all the viruses from pen drive.



How to Format USB Pen Drives Using Command Prompt to Delete Viruses Permanently

So let's see how to format your pen drive using command prompt.


Insert pen drive into your PC

Find the drive letter of the pen drive

Now click on Start ---> Run

In run box, type cmd and hit Enter

Now command prompt will appear, in this window type format "your pen drive letter:"
For example type : format g:


Hit Enter twice

Wait for sometime until command prompt verify the file system.



How to Format USB Pen Drives Using Command Prompt to Delete Viruses Permanently


Now command prompt will ask you to enter a drive name.

After that type the drive name and then hit Enter again.



How to Format USB Pen Drives Using Command Prompt to Delete Viruses Permanently


That's all, you have done !!!