Powered by Blogger.

Total Pageviews

I m on Twitter!

Saturday, February 25, 2012

Encrypt and Lock your Pendrive Data with USB Flash Security

USB flash drives are great BUT it doesn’t come with any security at all. USB flash drives are small and can be easily misplaced or stolen. In that case, all our pendrive content is open for others. We can play safe by not letting other people get our data in a pendrive by encrypting the drive.

USB Flash Security
is a security software that protects data in a USB flash drive by a password. It also offers a better way of protecting files which is that it encrypts the whole drive, leaving only a small space to for the unlocker file to sit in. If someone formats the drive, your encrypted space and data is still intact and only the unlocker file gets deleted which can be easily restored from the program on your computer.

Here’s a short walk-through on how easy it is to use USB Flash Security. After installation and run the shortcut, here’s what USB Flash Security looks like. It will automatically detect your flash drive when you insert one. All you need to do is click the
Install button.


Then you will be prompted to enter a password and the optional hint to remind you of your password if you forget.
After encrypting your USB flash drive, you can only find 2 files (autorun.inf and UsbEnter.exe) in your drive. Run UsbEnter.exe, enter your password and within a few quick seconds you’ll have access to the encrypted space for you to save, edit or delete files.
When you’re done, simply unplug or eject your flash drive and it will be automatically locked.

If you check the encrypted USB flash drive space, it’s only 476KB on my 8GB drive. That explains why even after formatting the drive the encrypted data is untouched as it only formats the 476KB removing the unlocker and autorun file.


Download USB Flash Security from here.

 

Download Avast! Antivirus 7.0 Final Edition

Released! Avast! Free Antivirus 7.0 Final – After been few weeks in beta, the Avast Free Antivirus v7.0 has now gone final public release. What’s so special about this new major update version of Avast Anti virus? Read on.
With more than 150,107,324 active users and growing, Avast Antivirus program is the best competitor to Avira Free Antivirus. That’s because its performance in detecting most kind and type of virus and malware come to infect your computer.
By this new release version of Avast AV, you can now install and enjoy virus-free experience even on Windows 8 Developer/Consumer Preview and further on it will also support Windows 8 Final (when it’s released).


avast 7 

Besides the full support to Windows 8, Avast 7.0 antivirus has also been equipped with several new technologies including:
- Ability to streaming, real-time virus database updates
- FileRep feature that lets you know whether a file is safe before you open it
- AVAST Management Portal feature
- New Remote Assistance tool lets you initiate remote support
- More advanced Customizable installation

avast 7 

Or shortly we can summarize all new features within Avast 7.0 as following :
- Streaming updates
- New installer
- Remote assistance
- Export/Import settings
- UI facelift
- Screensaver facelift
- Sandbox & Auto sandbox improvements
- Runs on Win8 Developer Preview
- Many other security and stability related fixes
- Browser protection improvements (including anti phishing)
- Reputation scanning via FileRep (cloud-based)
Avast v7.0 Antivirus tool is compatible on following operating system: Windows 8 Developer Preview (32-bit or 64-bit), Windows 7 (any Edition, 32-bit or 64-bit), Windows Vista (any Edition excl. Starter Edition, 32-bit or 64-bit), Windows XP Service Pack 2 or higher (any Edition, 32-bit or 64-bit), Windows 2000 Professional Service Pack 4 (incompatible with avast! Account).

Download Link 

File Name : avast_free_antivirus_setup.exe

File Size : 71.45MB


  For Download 
First Click on the download links
Then Wait for few seconds and then click on 
Download Link :Mirror 1 Mirror-2

Kill Processes Quickly and Easily with Task ForceQuit Pro

Our computer run lots of processes at the same time, and sometimes when one of the applications hang, we got no solution but to kill or terminate the process from the Windows default Task Manager. While for advanced users the task manager is simple to use, for the beginners it is somewhat difficult to understand and hard to operate.
Here is a simple tool called Task ForceQuit Pro that works in a similar way, the only difference being that it is way easier and quicker to operate and use. When you use this tool you will find all the processes running listed below one another with an image making it easier to find the process to terminate.





With a single click, you can kill the process the button for which is places besides the image of the tool. The tool also provides you with options like restarting the explorer (can be used in place of log off), shutdown and restart of the computer.
The tool is very simple, easy to use and even someone who don’t have much geeky knowledge can operate it to quickly find and kill a process running in the background. This tool is compatible with Windows 7, Vista and XP and is free to use.

Download Task ForceQuit Pro

Log amplifier

Log amplifier is a linear circuit in which the output voltage will be a constant times the natural logarithm of the input. The basic output equation of a log amplifier is v Vout = K ln (Vin/Vref); where Vref is the constant of normalisation, and K is the scale factor. Log amplifier finds a lot of application in electronic fields like multiplication or division (they can be performed by the addition and subtraction of the logs of the operand), signal processing, computerised process control, compression, decompression, RMS value detection etc. Basically there are two log amp configurations: Opamp-diode log amplifier and Opamp-transistor log.

Opamp-diode log amplifier.

diode opamp log amplifier
Opamp-diode log amplifier
The schematic of a simple Opamp-diode log amplifier is shown above. This is nothing but an opamp wired in closed loop inverting configuration with a diode in the feedback path. The voltage across the diode will be always proportional to the log of the current through it and when a diode is placed in the feedback path of an opamp in inverting mode, the output voltage will be proportional to the negative log of the input current. Since the input current is proportional to the input voltage, we can say that the output voltage will be proportional to the negative log of the input voltage.
According to the PN junction diode equation, the relationship between current and voltage for a diode is
Id = Is (e(Vd/Vt)-1)…………(1)
Where Id is the diode current, Is is the saturation current, Vd is the voltage across the diode and Vt is the thermal voltage.
Since Vd the voltage across the diode is positive here and Vt the thermal voltage is a small quantity, the equation (1) can be approximated as
Id = Is e(Vd/Vt)…………………(2)
Since an ideal opamp has infinite input resistance, the input current Ir has only one path, that is through the diode. That means the input current is equal to the diode current Id.
=> Ir = Id ………………….(3)
Since the inverting input pin of the opamp is virtually grounded, we can say that
Ir = Vin/R
Since Ir = Id (from equation (3) )
Vin/R = Id …………………..(4)
Comparing equation (4) and (2) we have
Vin/R = Is e(Vd/Vt)
i.e. Vin = Is R e(Vd/Vt)……………(5)
Considering that the negative of the voltage across diode is the output voltage Vout (see the circuit diagram (fig1)), we can rearrange the equation (5) to get
Vout = -Vt In(Vin/IsR)

Opamp transistor log amplifier.

In this configuration a transistor is placed in the feedback path of an opamp wired in inverting mode. Collector of the transistor is connected to the inverting input of the opamp, emitter to output and base is grounded. The necessary condition for a log amp to work is that the input voltage must be always positive. Circuit diagram of an Opamp-transistor log amplifier is shown below.
transistor-opamp log amplifier
Opamp-transistor log amplifier
From  Fig 2  it is clear that base-emitter voltage of the transistor Vbe = -Vout  ………(1)
We know that Ic = Iso (e(Vbe/Vt)-1) ………….(2)
Where Ic is the collector current of the transistor, Iso the saturation current, Vbe the base emitter voltage and Vt the thermal voltage.
Equation (1) can be approximated as Ic = Iso e(Vbe/Vt) ………….(3)
Ie, Vbe = Vt In (Ic/Iso) …………….(4)
Since input pin of an ideal opamp has infinite input impedance, the only path for the input current Ir is through the transistor and that means Ir = Ic.
Since the inverting input of the opamp is virtually grounded
Ir = Vin/R
That means Ic = Vin/R  ……………(5)
From equations (5) , (4) and (1) it is clear that
Vout = -Vt ln (Vin/IsoR1)………….(6)

Friday, February 24, 2012

How to access Facebook chatting without logging in to your Facebook profile…?


You can now freely chat with your friends, without logging in to your Facebook account.
It is not at all necessary to login to your FB account. Just continue your work on your desktop and the PC and whenever some of your friends wishes to chat with you, you will be instantly receive the alert on your desktop itself.
If you have Windows installed on your PC, follow this link and visit to ChitChat. Download the apps and install. That’s all…!
If you are using Mac, visit Adium and download the apps from here.
Particularly the Adium is a free instant messaging application for Mac OS X that can connect to AIM, MSN, Jabber, Yahoo, and more. Learn more about Adium…
image
Instant chatting can be used for the following…
image

Voltage and current distribution curves in radiation pattern of a dipole antenna


Basic action of an antenna

As per Maxwell’s theory, we know that the accelerated electrons always radiate energy in theOLYMPUS DIGITAL CAMERA          form of EM waves. When a high frequency current is passed through a conductor, then the free electrons inside the conductor get accelerated through it and thus it produces alternating EM wave or a field.
Hence, the EM waves are characterized by the so called electric field (E) and the magnetic field (H) which are always perpendicular to each other.

Concept of distribution of electric current in an antenna

When an antenna is connected in parallel with the output of a transmitter, high frequency alternating current starts flowing through the antenna (along the entire length of the antenna). Now the distribution of current through the antenna can be understood with the help of following important points and the following figure -
image
  1. Suppose at a particular instant of time, point A is negative and point B is positive.
  2. Then the flow of charges will be from point A to X and from Y to B, as shown in the above diagram.
  3. Now you may wonder that since the ends of the dipole antenna are open, how this flow of charges could be possible?
  4. Actually the result is as such that the end point X becomes continuously positively charged due to loss of electrons.
  5. At the same time, the end point Y becomes continuously negatively charged as it gains more and more electrons.
  6. In this way, the charge is maximum at both the end points X and Y.
  7. So the current is zero.
  8. However, at the center the charge density is zero and thus current is maximum, as it is shown clearly with a RED curve in the above diagram. It is called as “CURRENT DISTRIBTION CURVE”.
  9. Here it is assumed that the feeding of signals to the antenna is a sine wave, so the current wave is also sinusoidal in nature.
  10. In this way, when a dipole antenna is fed with a high frequency sinusoidal wave, from the output of a transmitter, then both types of distributions that is current and voltage distribution are produced along the length of the antenna.
image
Note-1: The conditions explained above are only possible in ideal conditions. When we consider, practical conditions, then some losses take place which can be found out with the help of some formulae.
Note-2: When the length of antenna is equal to half of the wavelength of transmitted signal, then such antenna is called as “Dipole Antenna”.
Star Have a look at the radiation pattern animation of a dipole antenna.

Facebook Albums to PDF

Every one of us likes to upload our photos to our social networking profiles right? Similarly, being a passionate photographer I also have many albums uploaded to my Facebook profile. If you are also some person who likes to upload a new pic every now and then, then here is a utility that will interest you.
With the help of this online app called Albums to PDF, you can convert or export all your Facebook profile photo albums into a PDF file which can be used for many purposes like you can forward it to your friends or just keep it with you as one sole album. You can also get it printed, so as to keep your album with you always.


 

How to convert album to PDF:
1. Just open the web link provided at the bottom of this article.
2. Click on the “Try it Now” link present on the web page.
3. The app will now open in your Facebook profile, where you need to click Go to App button.
4. Now it will open all the albums having two buttons on side, Express PDF (clicking which will convert the album to PDF quickly) and Customized PDF (clicking which you can customize your PDF for description etc).



5. You can also remove an album; edit the default photo description too.
6. When you are done, it will show you Export to PDF button clicking which you can download the PDF created.
A collage of the images will also be generated along with the PDF file. The only limitation of this app is that, it will place a watermark on every image since it is free to use.

Is Google a Boy or Girl ?

Male or female
Answer, after the jump...
Google Gender

 

Thursday, February 23, 2012

Free Facebook Airtel


Free Facebook Access on Airtel for Java Based Phones



If you own a Java based phone and you love to browse Facebook regularly like sitting on it and just chatting with your friends than you are lucky that Airtel has a nice offer for you as they have collaborated with Facebook to provide free internet access to all the Java based phones users till 24th of October, well yes its really a nice time for free Facebook surfing.


So now what you need to do is that you just to send a sms on 54321 typing Facebook like in the image on the right I have done and than you will get a reply from them saying download Facebook java app and enjoy free access till 24th Oct and there will be a link like you see in the image that blue color one just click on it and your download will start, install that app and enjoy free Facebook access till 24th of October. Well this can be a small time promotional offer from Facebook or Airtel so avail it now or you loose it.

Latest Airtel Hacking Free Gprs Tricks For PC February 2012 By Dailyhackingtips - Again Airtel Hack - Using Dot Proxy - Airtel Gprs Hacking




Hello to all friends i hope you all are fine . today i am sharing airtel new latest gprs tricks 100% working of February 2012 for PC.



Just Follow Some Few Easily steps for do this .

1. First you download dot proxy.


Important Note - .NET Framework Version 3.5 is Needed To Run Dot Proxy in PC




2. Now you open dot proxy and set local Listen Port As 1234






3. In Next step you go to header mode and then add and hit enter.

X-Online-Host:203.115.112.5/AirtelFB


                                         


4. Now you configure your browser and Internet Download Manager

Proxy - 127.0.0.1

Port - 1234

That's It Now you done .

this latest trick is working most of the states in india please check it .





  For Download 
First Click on the download links
Then Wait for few seconds and then click on 




Tuesday, February 21, 2012

Kaspersky Internet Security 2012 for 1 year

Kaspersky Internet Security 2012 for 1 year :

One of the best antivirus in the world right now is Kaspersky. In 2011 has now come out the latest version, the Kaspersky Internet Security (KIS) 2012. Which at this latest version this antivirus owns a improvement of previous versions of KIS 2011. it is more robust in protecting your computer / laptop we are from a wide range of digital threats,and protects from viruses, phishing attacks, malicious websites, Trojans, spam, hackers, and others.


Features & Ease of Use :

1. Automatic protection
2. Get effective protection from unknown threats.
3. Communicate on your favorite social networking safety
4. Getting immediate protection from emerging threats
5. Roll back the changes made by malware
6. The benefits of hybrid protection
7. Protect your identity from phishing attacks
8. Enjoy secure online banking and shopping

Download KIS 2012 from official site

Proof : 


 

Now the main part:

Drag and Drop Key Changer for KIS 2011/2012

 

Download it here

 

 

 I have been Providing you 365 days key for KIS 2012

Download from below server (any one)

 

Server 1

Server 2

 

key valid till 11-1-2013

Enjoy...

More Keys you can find below 

 

KIS 2012 More Keys

 

http://www.mediafire.com/?6icmvr78sykkkbf

 

Note:


  For Download 
First Click on the download links
Then Wait for few seconds and then click on 

 

 

For any query Comment....

 

Thank you... 

 

Ads By Sponsers