Top Ten Tips To Improve System Speed

speed up
Here's the Top Ten Tips To Improve Your Windows System More Speedy:

  1. Let your PC boot up completely before opening any applications.
  2. Refresh the desktop after closing any application. This will remove any unused files from the RAM.
  3. Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).
  4. Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM
  5. Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.
  6. Delete the temporary internet files regularly.
  7. Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.
  8. Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.
  9. When installing new Softwares disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.
  10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.

Note: RAM IS THE WORKING AREA (DESKTOP) OF THE CPU, KEEP IT AS EMPTY AND UNCLUTTERED AS POSSIBLE!

Tips to optimize Laptop Battery – Improve laptop battery life with laptop battery care


laptop-battery


Laptop Battery Tips

Optimizing laptop battery usage is very important to increase the battery life and performance.

Following are the Top tips to optimize the laptop battery :
  • Buy smart: Look for notebooks with low power consuming processors like the Intel’s “CULV” “Consumer Ultra-Low Voltage” processors or AMD processors with “cool & Quiet” feature.
  • Dim screen brightness: Choose an environment with adequate lighting—less brightness means you’ll drain less power from your battery.Use the Function key (Fn) available in most of the laptops to dim the brightness.
  • Run your applications wisely: To get the most from your laptop, even when multitasking on the go, run resource intensive applications just when actively using them. Then make sure to close the applications you aren’t using.Running Video on the laptop will consume the battery very fast.Avoid to run video almost all time.
  • Close unused applications: Programs will still use power while sitting idle.Also some unrequired background processes can  be closed using the task manager.Stop such processes from starting at boot.
  • Have the right RAM for your needs: With appropriate RAM, instructions run off memory instead of disk. Less power is needed to refresh the RAM than to spin the hard drive.So increasing the RAM in in the laptop with high resource usage works will highly improve the battery life.
  • Clean your battery: Rub the battery’s metal contacts with rubbing alcohol every two months. Allow to dry before re-inserting.
  • Remove extra accessories: Unplug items like PC cards, USB and FireWire devices that are not being used.
  • Use built-in power management devices: Enable this feature and set your system to “Battery Optimized” mode or “Max Battery” mode. Put your computer to sleep earlier and turn off the screen backlight sooner.Start > Control Panel > Power Options (in Classic View).
  • Disable Wi-Fi and Bluetooth if not being used: Wireless LAN and Bluetooth access uses power even when it is not in use. Transmitting and receiving data drains the battery.
  • Defragment your hard drive regularly: The built-in defrag utility included with Windows  will take your file fragments and put them closer together on your hard drive, which will decrease hard drive access times and save battery life.
  • Use Direct Power as much as possible : Keep your laptop connected to the direct power supply using the laptop power adapter as much as possible.
  • Connect laptop to UPS supply : If possible then connect your laptop to UPS supply.This will save your laptop from power fluctuations and if there are frequent power cuts then your laptop battery life-cycle will not be wasted.
  • Use battery only when on move : Try to power laptop through battery only when you are on move or if there is no power supply.

Nokia X2 Price in India – Affordable Price 5 Megapixel mobile

Nokia X2 Price IndiaNokia X2 Price India

Nokia X2 Price

The new Nokia X2 is the cheapest Price mobile phone from Nokia with 5 Megapixel camera.Nokia X2 is also the cheapest price mobile in the new launched Nokia X series mobile phones.Nokia X2 is a good music mobile phone featuring dual speakers, dedicated music keys, FM stereo and 3.5mm headphone jack.Nokia X2 also features quick launch of Facebook from the homescreen and comes with Nokia Messaging for email and IM.It is built with premium materials giving it sleek and modern look and feel with its curved design and colourful accents.Nokia X2 is built for music lovers everywhere with its FM radio, music player and powerful speakers.It comes with free 25 song vouchers to download free songs from the Nokia Ovi store .
Nokia X2 features :

  • Candybar form factor
  • 2.2-inch QVGA screen
  • 13mm thin
  • Weight 81gm
  • Dual speakers
  • Dedicated music keys
  • FM stereo
  • microSD card
  • Bluetooth 2.1
  • 3.5mm headphone jack
  • USB 2.0
  • Ovi Player
  • Windows Media Player 11.
  • Direct access to Facebook from the homescreen
  • access to apps from Ovi Store
  • 5 megapixel camera


Nokia X2 detailed specifications :
  • Network : Quad Band GSM
  • Dimensions:111 x 47 x 13.3 mm, 61 cc
  • Weight:81 g
  • Display:2.2 inch TFT,256K colors,240×320 pixels resolution
  • Series 40 User Interface
  • Dedicated music keys
  • Memory Internal 48 MB
  • MicroSD memory card slot, hot swappable, up to 16 GB
  • GPRS/EDGE
  • Stereo Bluetooth version 2.1 with Enhanced Data Rate
  • High-Speed USB 2.0 (micro USB connector)
  • USB charging
  • 3.5 mm AV connector
  • Camera:5 Megapixel, 2592×1944 pixels, LED flash
  • WAP 2.0/xHTML, HTML (Opera mini browser)
  • Stereo FM radio with RDS; built-in antenna
  • Games:Bounce Tales, City Bloxx, Snake III, Block’d, Diamond Rush, Rally 3D, Brain Champion, Sudoku
  • Colors:Red on Black, Blue on SIlver
  • Flight mode
  • Nokia Messaging Service 2.0
  • Java MIDP 2.1
  • Video Player : MPEG-4, 3GPP: H.263 and H.264 codecs
  • Comes with Music*
  • Media Player with metadata ID3 tags and album art support
  • Nokia Music Store support
  • Music codecs: mp3, AAC, eAAC, eAAC+ and WMA
  • Stereo Bluetooth 2.1 support
  • Dual stereo speakers
  • BL-4C 860 mAh Li-Ion battery
  • Talk time: up to 810 mins
  • Standby time: up to 540 hours
  • Music playback time: up to 26.8 hours (idle, middle volume)


Nokia X2 Price in India

Nokia X2 Price in India

Nokia X2 Price in India : The new Nokia X2 is launched in India at price of Rs.5,499.It is the cheapest price 5 megapixel camera mobile phone available from Nokia.It is now available in the market.


Yahoo! Answers

Yahoo!Answers.png
Yahoo! Answers (Formerly known as Yahoo! Q & A) is a community-driven question-and-answer (Q&A) site launched by Yahoo! on July 5, 2005 that allows users to both submit questions to be answered and answer questions asked by other users. The site gives members the chance to earn points as a way to encourage participation and is based onNaver's Knowledge iN. Yahoo! Answers is available in 12 languages, but several Asian sites operate a different platform which allows for non-Latin characters. The platform is known asYahoo! Chiebukuro (Yahoo!知恵袋?) in Japan, and Yahoo! Knowledge in Korea, Taiwan, China, and Hong Kong. An Arabic language Q&A platform calledSeen Jeem is available through the Yahoo! subsidiary Maktoob.
Yahoo! Answers was created to replace Ask Yahoo!, their former Q&A platform which was discontinued in March 2006.
Yahoo! Answers is the second most popular Q&A site in the US after Answers.com, according to comScore.

CCleaner 3.00.1303

CCleaner is a freeware system optimization, privacy and cleaning tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it's fast (normally taking less than a second to run) and contains NO Spyware or Adware! :)




Cleans the following:
  • Internet Explorer
  • Firefox
  • Google Chrome
  • Opera
  • Safari
  • Windows - Recycle Bin, Recent Documents, Temporary files and Log files.
  • Registry cleaner
  • Third-party applications
  • 100% Spyware FREE
DOWNLOAD NOW 

Protecting your privacy while using bittorrent!


Torrent these days is one of the most loved platform for downloading files, mostly cracked one. With piracy arrives the risk of protecting your privacy. Here we will explain you how to protect your privacy while using bittorrent, one of the famous torrent clients out there. Viruses and other forms of malware are the most basic of threats.  The files you download are foreign and you should treat them as such; scan them promptly after downloading them.  Most major anti-virus programs have the ability to add folders for auto-scanning, which is probably the ideal solution if you either don’t have time or don’t want to waste effort doing things manually.

utorrentEncryption

One way to help alleviate these problems is to enable encryption for your connections.  This prevents the data sent between two peers from being understood by onlookers, although it doesn’t prevent them from seeing their IP addresses or certain details from the tracker, such as amount of data transferred.
This is not a perfect solution, however.  Encryption has to be supported by your peers as well, and they may not have their clients set to use it.  Some trackers don’t even allow encryption, but if yours does, it’s not a bad idea to enable preferring encrypted connections, but allowing unencrypted transfers if none are present.
Enable Encryption in uTorrent
Open uTorrent, go to Options > Preferences, and then click where it says BitTorrent on the left. Under where it says “Protocol Encryption,” choose Enabled and click on Allow incoming legacy connections.  This will allow outbound encryption but still accept non-encrypted connections when there are no encrypted connections available.

peerblockIP Blockers

Another thing you can do is use an IP blocker.  These programs run alongside an existing firewall (you DO have a firewall, don’t you?) and your BitTorrent client and they filter out IP addresses based on blocklists.  Blocklists compound ranges of IPs that contain known problems, such as monitoring and bad packet transfer.  How well they work is up for debate, and there is no consensus on whether they do anything at all.  Websites and trackers that are fine sometimes get blocked, and you have to manually allow them.
If you’re a cautious person, however, it’s not a bad idea to run an IP blocker just in case.  The most well-known ones are PeerBlock for Windows and Moblock for Linux, and Transmission for both Mac and Linux has the ability to use a blocklist.  PeerBlock, once installed, allows you to download and update blocklists and automatically starts to block IP addresses.
Install and Configure PeerBlock on Windows
Download PeerBlock from their website.  The beta is pretty stable and provides the most useful features, and is compatible with Windows XP, Vista, and 7 (all versions).

How to clear an unknown BIOS password.

If you encounter a password prompt at boot or the BIOS / CMOS setup is locked as shown below and you do not know the password you will need to clear the BIOS password using the suggestions listed below.
CMOS setup locked password screen
Generic BIOS / CMOS passwords
Try using generic CMOS passwords. A complete listing of these passwords can be found on document CH000451.
Use a BIOS password utility
There are utilities designed to help bypass CMOS passwords. An example of a great utility to decrypt / bypass BIOS passwords is the PC BIOS Security and Maintenance toolkit, which is available by clicking here.

Clear using jumper (recommended)
Precaution: When inside the computer please be sure you're aware of the potential damage that can be caused by ESD.
CMOS password jumperOn the computer motherboard locate the BIOS clear / password jumper or dipswitchand change its position. This jumper is often labeled CLEAR, CLEAR CMOS, JCMOS1, CLR, CLRPWD, PASSWD, PASSWORD, PSWD or PWD as shown in the picture to the right. To change the jumper simply remove it from the two pins its currently on so that it covers the pin that is not covered. For example, in the picture to the right pins 1 and 2 are covered, you'd remove the jumper and put it on pins 2 and 3.
Once this jumper has been changed, turn on the computer and the password should be cleared. Once cleared, turn the computer off and return the jumper or dipswitch to its original position.
The location of the jumpers or dipswitches are dependent on the manufacturer of the computer and motherboard. However, below are some general ideas on where to find it. Remember that most motherboards could have dozens of different jumpers, make sure you're changing the CMOS jumper and not something else. If these general suggestions do not help refer to your motherboard / computer documentation or skip to the next step.
  1. On the edge of the motherboard - Most jumpers are located on the side of the motherboard for easy accessibility, verify by looking at all visible edges of the motherboard.
  2. By the CMOS battery - Some manufactures will place the jumper to clear the CMOS / BIOS password by the actual CMOS battery.
  3. By the processor - Some manufactures will place the jumpers by the processor of the computer.
  4. Under the keyboard or bottom of laptop - If you are working on a laptop computer the location of the dipswitch (almost never a jumper) can be under the keyboard or on the bottom of the laptop in a compartment such as the memory compartment.
  5. Other visible location - While it is possible that the jumpers / dipswitches may not be in a visible location, most manufactures try to make things easier by placing the jumpers / dipswitches in another visible location.
Remove CMOS battery
CMOS batteryRemoving the CMOS battery like the one shown in the picture to the right will cause the system to loose all CMOS settings including the password. To do this locate and remove the CMOS battery on themotherboard for at least five-minutes. After this has been done put the battery back into the computer and turn it back on.
Jump the CMOS solder beads
Older computers and especially older laptops don't have jumpers or dipswitches and require the user to jump a pair of solder beads on a circuit board. The identification and location of these solder beads can vary and if not available in computer documentation is only obtainable through the computer manufacturer.
If you've identified the solder beads they can be jumped by placing a flat-head screwdriver over the two beads and leaving it on those beads while turning on the computer. Once the computer has booted turn off the computer and then remove the screwdriver.
Contact manufacturer
If the above solutions do not help or you are unable to locate the jumpers or solder beads, it's recommended you contact the computer manufacturer ormotherboard manufacturer for the steps on clearing the computer password.

powered by  www.computerhope.com   good luck

Ways to Use Computers to Protect the Environment


It is hard to imagine modern life without computers, 



even for the most environmentally conscious person. 


While it's obvious that computers use energy to function, 


are there some ways in which smart computer usage can actually lower a person's impact on the environment? Yes. It's just a matter of using the computer intelligently and in moderation.


Go Paperless
Printing every document sent to you not only uses up paper, but also ink and energy. Instead of printing documents and filing them, try saving receipts and e-mails to your hard drive using a PDF printer. This not only helps the environment, but can often be a lot easier to keep track of than paper documents. Linux- and Mac-based systems come with this option by default; Windows users can install a free program called PDFCreator.



No Screen Saver
Screen savers are mostly an outdated concept --- few modern monitors will "burn" anymore. If your computer is set to use a screen saver, it is using electricity unnecessarily. Consider instead setting your computer monitor to turn off after a set period of time. This easily can be done in the same window where you configure your screen saver.


Turn It Off
You don't need your computer on all the time. When you're not using it, turn it off. Don't want to close all your programs? Suspend the computer instead, which keeps everything open without the power usage. In Windows this is done by clicking "Start," then "Shut Down," then "Suspend." Most laptops will suspend if you close the lid.


Use a Flash Drive
Blank CDs are a cheap and easy way to move data, but are largely disposable. If you need to move files from one computer to anther without using a network, consider using a flash drive or external hard drive instead of disposable CDs. If you still prefer CDs, consider buying re-writable dics. Reusing is always a good idea if you care about the environment.


Fix Your Old Computer
Think it is time to buy a new computer? Think again. Many computers, particularly those running Microsoft Windows, get slower as time goes on --- but that has more to do with software than hardware. Simply reinstalling the operating system can give what seems like an old, slow computer a new lease on life. Still not fast enough? Installing more RAM is cheap, impacts the environment less and might be all you need. Try this before buying a new computer, which unnecessarily uses up resources and energy, not to mention your money.



Firefox 3.6.12


Top Features

  • Awesome Bar
  • One-Click Bookmarking
  • Super Speed
  • Easy Customization
  • Anti-Phishing & Anti-Malware
  • Password Manager
  • Session Restore
  • Instant Web Site ID
  • Add-ons
  • Outdated Plug-In Detection
  • Crash Protection
  • Over 6,000 Ways to Customize
  • RSS Feed Reader
  • Location-Aware Browsing
  • ETC


Firefox 2, Firefox 3, Firefox 3.5 performance chart



NVIDIA GeForce GT 430 – Ultimate Performance Graphics card with DirectX 11 support

NVIDIA GT430 Price
The new NVIDIA GeForce GT 430 is an affordable price Graphics card with Microsoft’s DirectX 11 support .With the new NVIDIA GeForce GT 430 , Stream HD movies faster and render high-res photos instantly. Bring home the 3D theatre experience with Blu-Ray 3D and NVIDIA GeForce – over 400 titles available in 3D. Supercharge your favorite applications and push the limits of your Web experience with a new generation of GPU-accelerated browsers like Internet Explorer 9. Level-up your game with the next-generation gaming architecture built from the ground up for DirectX 11.
Nvidia GeForce GT 430 graphics card key features are :

  • Support for HDMI 1.4a, a TV standard for delivering 3D content and advanced multi-channel digital audio
  • Special video engine to accelerate Blu-ray 3D content, delivering optimal 3D visuals at a full 1080p resolution
  • High-definition 24-bit multi-channel audio up to 192KHz, and lossless DTS-HD Master Audio and Dolby TrueHD audio bit streaming
  • Dedicated video processing engine for reduced system power and heat
  • Support for NVIDIA PhysX® technology, the industry’s most comprehensive, cross-platform physics solution


Nvidia GeForce GT 430 graphics card specifications :
  • GPU Engine Specs:
    • CUDA Cores : 96
    • Graphics Clock (MHz) : 700 (DDR3) MHz
    • Processor Clock (MHz) : 1400 MHz
    • Texture Fill Rate (billion/sec) : 11.2
  • Memory Specs:
    • Memory Clock (MHz) : 800 – 900 (DDR3)
    • Standard Memory Config : 1 GB DDR3/GDDR5(2GB per GPU)
    • Memory Interface Width : 128-bit
    • Memory Bandwidth (GB/sec) : 25.6 – 28.8
  • Feature Support:
    • NVIDIA 3D Vision Ready
    • NVIDIA PureVideo® Technology* HD
    • NVIDIA PhysX-ready
    • NVIDIA CUDA Technology
    • Microsoft DirectX 11
    • OpenGL 4.0
    • Bus Support : PCI-E 2.0 x 16
    • Certified for Windows 7
  • Display Support:
    • Maximum Digital Resolution : 2560×1600
    • Maximum VGA Resolution : 2048×1536
    • Standard Display Connectors : HDMI
    • VGA (optional)
    • Dual Link DVI
    • Multi Monitor
    • HDCP
    • HDMI
    • Audio Input for HDMI : Internal

Nvidia GeForce GT 430 Price in India

Nvidia GeForce GT 430 Price in India : The new Nvidia GeForce GT 430 price will be around Rs.5,000-6000 

Hijack Facebook, Twitter accounts with Firesheep, How to Secure against it


FiresheepHave you ever imagined how is it is to hack someones Facebook, Twitter, Live accounts with a single click? Yes! Now its possible with Firesheep an extension for Firefox which helps you to hijack an open Wi-Fi connection.
Firesheep is a work of  Eric Butler who made the proof oc concept public after after presenting at a Security event. The purpose of the experiment was to showcase the security risks associated with session hijacking, aka sidejacking.
So what all can be hacked with Firesheep? Nearly  26 online services, which includes all popular online services: Amazon, Facebook, Foursquare, Google, The New York Times, Twitter, Windows Live,WordPress and Yahoo.
The extension is so flexible that it can be customized to allow a hacker to target other Websites not listed by Firesheep. While Firesheep sounds scary, its not as scary as it may sound first. Even though the extension is downlaoded more than 100,000 times, there’s nothing to be scared of.
Install WinPcap on windows (Mac Os doesn’t need this) and get the Firesheep extension and then open it up by clicking on View>Sidebars>Firesheep. Click the button that says “Start Capturing.” Once you click the button, it starts snooping. Then onwards all sessions that are captured are automatically displayed.
How to Bypass Firesheep Hijacks?

  1. If you feel your account has been compromised, immidiately logout. As soon as you do that, hijacked cookie becomes invalid, and no longer can be mis-used.
  2. Use A VPN: Try using a Virtual Private Network client such as the free version of HotSpot Shield. This piece of software basically creates a secure tunnel for your data that runs between the Wi-Fi router and your computer.
  3. USe HTTPS Everywhere: If you’re a Firefox user you can also use extensions such as HTTPS Everywhere built by the Electronic Frontier Foundation. This extension forces certain Websites to use a secure SSL connection for your entire browsing session instead of just the login.
  4. Use Strict Transport Security (STS): Strict Transport Security (STS) is a relatively new security feature that is starting to appear in some browsers. STS automatically forces your browser to make a secure connection with every Web page that supports SSL encryption. Once you start using STS, you will not be able to use an insecure connection ever again when connecting to a specific site such as Facebook or Amazon. Chrome has supported STS since Chrome 4, and Firefox 4 will include STS when the official version launches in the coming months.
  5. Encrypt your home/office network:  Use the strongest possible encryption on your Home and office Wifi connections.  WPA2 is much better than WEP.
Share and Enjoy:

what is 4G check out Here !!








Overview                                           Telia-branded Samsung LTE modem
                                                          
A 4G system is expected to provide a comprehensive and secure all-IP based solution where facilities such as IP telephony, ultra-broadband Internet access, gaming services, and streamed multimedia may be provided to users.
This article uses 4G to refer to IMT-Advanced (International Mobile Telecommunications Advanced), as defined by ITU-R..
An IMT-Advanced cellular system must have target peak data rates of up to approximately 100 Mbit/s for high mobility such as mobile access and up to approximately 1 Gbit/s for low mobility such as nomadic/local wireless access, according to the ITU requirements. Scalable bandwidths up to at least 40 MHz should be provided.
In all suggestions for 4G, the CDMA spread spectrum radio technology used in 3G systems and IS-95 is abandoned and replaced by frequency-domain equalization schemes, for example multi-carrier transmission such as OFDMA. This is combined with MIMO (i.e., multiple antennas(Multiple In Multiple Out)), dynamic channel allocation and channel-dependent scheduling.
Predecessors of 4G


First-release LTE





Telia-branded Samsung LTE modem
The pre-4G technology 3GPP Long Term Evolution (LTE) is often branded "4G", but the first LTE release does not fully comply with the IMT-Advanced requirements. LTE has a theoretical net bit rate capacity of up to 100 Mbit/s in the downlink and 50 Mbit/s in the uplink if a 20 MHz channel is used — and more if Multiple-input multiple-output (MIMO), i.e. antenna arrays, are used.
The world's first publicly available LTE-service was opened in the two Scandinavian capitals Stockholm (Ericsson system) and Oslo (a Huawei system) on the 14 December 2009, and branded 4G. The user terminals were manufactured by Samsung [2] The two largest major mobile carriers in the United States and several worldwide carriers have announced plans to convert their networks to LTE beginning in 2011.
The physical radio interface was at an early stage named High Speed OFDM Packet Access (HSOPA), now named Evolved UMTS Terrestrial Radio Access (E-UTRA).
LTE Advanced (Long-term-evolution Advanced) is a candidate for IMT-Advanced standard, formally submitted by the 3GPP organization to ITU-T in the fall 2009, and expected to be released in 2012. The target of 3GPP LTE Advanced is to reach and surpass the ITU requirements. LTE Advanced should be compatible with first release LTE equipment, and should share frequency bands with first release LTE.
WiMAX and Mobile WiMAX
The Mobile WiMAX (IEEE 802.16e-2005) mobile wireless broadband access (MWBA) standard is sometimes branded 4G, and offers peak data rates of 128 Mbit/s downlink and 56 Mbit/s uplink over 20 MHz wide channels[citation needed]. The IEEE 802.16m evolution of 802.16e is under development, with the objective to fulfill the IMT-Advanced criteria of 1 Gbit/s for stationary reception and 100 Mbit/s for mobile reception. The world's first commercial mobile WiMAX service was opened by KT in Seoul, South Korea on 30 June 2006.
Sprint Nextel has begun using WiMAX, as of September 29, 2008 branded as a "4G" network.
UMB (formerly EV-DO Rev. C)
Main article: Ultra Mobile Broadband
UMB (Ultra Mobile Broadband) was the brand name for a discontinued 4G project within the 3GPP2 standardization group to improve the CDMA2000 mobile phone standard for next generation applications and requirements. In November 2008, Qualcomm, UMB's lead sponsor, announced it was ending development of the technology, favouring LTE instead. The objective was to achieve data speeds over 275 Mbit/s downstream and over 75 Mbit/s upstream.


4G features


The 4G system was originally envisioned by the Defense Advanced Research Projects Agency (DARPA). The DARPA selected the distributed architecture, end-to-end Internet protocol (IP), and believed at an early stage in peer-to-peer networking in which every mobile device would be both a transceiver and a router for other devices in the network eliminating the spoke-and-hub weakness of 2G and 3G cellular systems.[16] However, the first LTE USB dongles do not support any other radio interface. Although legacy systems are in place to adopt existing users, the infrastructure for 4G will be only packet-based (all-IP). Some proposals suggest having an open Internet platform. At an early stage, technologies considered to be 4G were: Flash-OFDM, the 802.16e mobile version of WiMax (also known as WiBro in South Korea), HC-SDMA (see iBurst), and LTE.

Google Chrome 8.0.552.11 Beta



Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.
One box for everything
Type in the address bar and get suggestions for both search and web pages.
Thumbnails of your top sites
Access your favorite pages instantly with lightning speed from any new tab.
Incognito mode
Don't want pages you visit to show up in your web history? Choose incognito mode for private browsing.
Safe browsing
Google Chrome warns you if you're about to visit a suspected phishing, malware or otherwise unsafe website.
For information about alpha and developer builds, check out the Chrome dev channel here.

Serials keys

  • Pro Evolution Soccer 2011

           AN26-H6HU-X2N9-KC7U-SKHK K4RL-DR2Y-JYP5-7S7Y-S5L5  VHXM-XYPH-TU64-VWXD-C26N

  • TuneUp 2010

           2HNDD9-FDH78Q-BK0MDC-79KK7P-942M1V-5211MH



  •  Avast 5.0

            C1397167H1400A0811-7BKBKFNX


MORE SERIALS COMING SOON 
NJOY WITH US !!!!

NTLDR is missing : error solved

Related errors:
Below are the full error messages that may be seen when the computer is booting.
NTLDR is Missing
Press any key to restart
Boot: Couldn’t find NTLDR
Please insert another disk
NTLDR is missing
Press Ctrl Alt Del to Restart
Causes:
  1. Computer is booting from a non-bootable source.
  2. Computer hard disk drive is not properly setup in BIOS.
  3. Corrupt NTLDR and/or NTDETECT.COM file.
  4. Misconfiguration with the boot.ini file.
  5. Attempting to upgrade from a Windows 95, 98, or ME computer that is using FAT32.
  6. New hard disk drive being added.
  7. Corrupt boot sector / master boot record.
  8. Seriously corrupted version of Windows 2000 or Windows XP.
  9. Loose or Faulty IDE/EIDE hard disk drive cable.
  10. Failing to enable USB keyboard support in the BIOS.
Solutions:
Computer is booting from a non-bootable source


Many times this error is caused when the computer is attempting to boot from a non-bootable floppy disk or CD-ROM. First verify that no floppy diskette is in the computer, unless you are attempting to boot from a diskette.
If you are attempting to boot from a floppy diskette and are receiving this error message it is likely that the diskette does not have all the necessary files and/or is corrupt.
If you are attempting to install Windows XP or Windows 2000 and are receiving this error message as the computer is booting verify that your computer BIOS has the proper boot settings. For example, if you are attempting to run the install from the CD-ROM make sure the CD-ROM is the first boot device, and not the hard disk drive.
Second, when the computer is booting you should receive the below prompt.
Press any key to boot from the CD
Important: When you see this message press any key such as the Enter key immediately, otherwise it will try booting from the hard drive and likely get the NTLDR error again.
Note: If you are not receiving the above message and your BIOS boot options are set properly it’s also possible that your CD-ROM drive may not be booting from the CD-ROM properly. Verify the jumpers are set properly on the CD-ROM drive. Additional information about checking the CD-ROM drive connections can be found on document CH000213.
Additional information: This error has also been known to occur when a memory stick is in a card reader and the computer is attempting to boot from it. If you have any type of card reader or flash reader make sure that no memory stick is inside the computer.
Computer hard disk drive is not properly setup in BIOS
Verify that your computer hard disk drive is properly setup in the BIOS / CMOS setup. Improper settings can cause this error. Additional information on how to enter the BIOS / CMOS setup can be found in document CH000192.
Corrupt NTLDR and/or NTDETECT.COM file
Windows 2000 users
If your computer is using Microsoft Windows 2000 and you are encountering the NTLDR error. Create the belowboot.ini file on the floppy diskette drive.
[boot loader]
timeout=30
default=multi(0)disk(0)rdisk(0)partition(1)WINNT
[operating systems]
multi(0)disk(0)rdisk(0)partition(1)WINNT=”Microsoft Windows 2000 Professional” /fastdetect
Copy the NTLDR and NTDETECT.COM files from another computer using the same operating system. Both of these files are located in the root directory of the primary hard disk drive. For example, C:NTLDR and C:NTDETECT.COM should be the locations of these files on many computers.
  • Please keep in mind that these files are hidden system files.
Once these files have been copied to a floppy diskette reboot the computer and copy the NTLDR and NTDETECT.COM files to the root directory of the primary hard disk drive. Below is an example of what commonly should be performed from the A:> drive.
copy ntldr c:
copy ntdetect.com c:
After the above two files have been copied, remove the floppy diskette and reboot the computer.
Windows XP users
  1. Insert the Windows XP bootable CD into the computer.
  2. When prompted to press any key to boot from the CD, press any key.
  3. Once in the Windows XP setup menu press the “R” key to repair Windows.
  4. Log into your Windows installation by pressing the “1″ key and pressing enter.
  5. You will then be prompted for your administrator password, enter that password.
  6. Copy the below two files to the root directory of the primary hard disk. In the below example we are copying these files from the CD-ROM drive letter, which in this case is “e.” This letter may be different on your computer.copy e:i386ntldr c:
    copy e:i386ntdetect.com c:
  7. Once both of these files have been successfully copied, remove the CD from the computer and reboot.
Misconfiguration with the boot.ini file
Edit the boot.ini on the root directory of the hard disk drive and verify that it is pointing to the correct location of your Windows operating system and that the partitions are properly defined. Additional information about the boot.ini can be found on document CH000492.
Attempting to upgrade from a Windows 95, 98, or ME computer that is using FAT32
If you are getting this error message while you are attempting to upgrade to Windows 2000 or Windows XP fromWindows 95Windows 98, or Windows ME running FAT32 please try the below recommendations.
  1. Boot the computer with a Windows 95, Windows 98 or Windows ME bootable diskette.
  2. At the A:> prompt type:sys c: <press enter>
  3. After pressing enter you should receive the “System Transferred” message. Once this has been completed remove the floppy diskette and reboot the computer.
New hard disk drive being added
If you are attempting to add a new hard disk drive to the computer make sure that drive is a blank drive. Adding a new hard disk drive to a computer that already has Windows installed on it may cause the NTLDR error to occur.
If you are unsure if the new drive is blank or not try booting from a bootable diskette and format the new hard disk drive.
Corrupt boot sector / master boot record
It’s possible your computer’s hard disk drive may have a corrupt boot sector and/or master boot record. These can be repaired through the Microsoft Windows Recovery console by running the fixboot and fixmbrcommands.
Seriously corrupted version of Windows 2000 or Windows XP
If you have tried each of the above recommendations that apply to your situation and you continue to experience this issue it is possible you may have a seriously corrupted version of Microsoft Windows. Therefore we would recommend you reinstall Microsoft Windows 2000 and Windows XP.
If you are encountering this issue during your setup you may wish to completely erase your computer hard disk drive and all of its existing data and then install Microsoft Windows 2000 / Windows XP
Loose or Faulty IDE/EIDE hard disk drive cable
This issue has been known to be caused by a loose or fault IDE/EIDE cable. If the above recommendation does not resolve your issue and your computer hard disk drive is using an IDE or EIDE interface. Verify the computer hard disk drive cable is firmly connected by disconnected and reconnecting the cable.
If the issue continues it is also a possibility that the computer has a faulty cable, try replacing the hard disk drive cable with another cable and/or a new cable