Saturday, February 21, 2009

Right processor to power your PC !!

Entry-level
Suggested CPUs

Intel Celeron D 326, Intel Pentium D 915, AMD Sempron 64 3200+, AMD Athlon 64 X2 3800+
Budget

Rs 2,800 – Rs 4,500
Apart from price and clock speeds, the choice of a processor depends on several other factors such as the number of cores, L2 cache, front side bus, and most critically, your application area. It doesn’t make sense in arming your PC with a high-end dual core processor if you’re only going to surf the web or use office applications—an entry-level processor will do just fine. Processors belonging to this category are ideal for home and office users who want a Plain Jane PC for basic computing needs. You have two options here. If you’re on a really tight budget you can opt for a single-core processor belonging to the Intel Celeron D or AMD Sempron 64 family. The processors from these families come with clock speeds ranging from 1.6 to 3.6 GHz. Alternatively, you can opt for an entry-level dual-core processor if you want more power for multi-tasking and applications like image editing or audio and video encoding. Priced below Rs 4,500, the Intel Pentium D 915 (2.80 GHz, 2x 2 MB L2 cache) and AMD Athlon 64 X2 3800+ (2 GHz, 2x 512 KB L2 cache) offer great performance at a sweet price.

Mid-range
Suggested CPUs
Intel Core 2 Duo E6320, Intel Core 2 Duo E6420, AMD Athlon 64 X2 4600+, AMD Athlon 64 X2 5200+
Budget
Rs 5,000 – Rs 11,000

Pick a processor in this category if you want power while staying within a five-figure budget. These processors are designed to handle moderate to heavy loads involving multi-tasking, audio and video editing, gaming, 3D modeling and so on. Dual-core is obviously a must. However, pay attention to the clock speed and the size of L2 cache, which determine the performance of a processor. If your choice is Intel, look out for a minimum clock speed of 1.86 GHz with 4 MB of L2 cache (Intel Core 2 Duo E6320). AMD users shouldn’t settle for anything below 2.4 GHz with 1 MB of L2 cache (AMD Athlon 64 X2 4600+). The more expensive processors in this category feature higher clock speeds coupled with larger L2 caches. Processors from the Intel Core 2 Duo and AMD Athlon 64 X2 families come in varying combinations of clock speeds and L2 cache amounts. Make sure you look at all the available options offered by Intel and AMD. This informaton will be available on their websites. If you come across a processor with a higher clock speed or L2 cache that still fits your budget, grab the deal.

High-end
Suggested CPUs

Intel Core 2 Duo E6700, Intel Core 2 Extreme QX6700, AMD Athlon 64 X2 5600+, AMD Athlon 64 X2 6000+
Budget
Above Rs 11,000

This segment caters to power users, enthusiasts and hardcore gamers who crave extreme performance. The processors here are supercharged with high clock speeds and large L2 caches handle heavy multitasking and demanding applications. Processors like the Intel Core 2 Duo E6700 and AMD Athlon 64 X2 6000+ are the best in their respective families. If you enjoy pushing your PC to extreme limits, an unlocked multiplier would make overclocking much more flexible. All processors from the Intel Core 2 Extreme family and the AMD Athlon 64 FX-62 come with unlocked multipliers. Quad core processors like the Intel Core 2 Extreme QX6700 and the Intel Core 2 Quad Q6600 are ideal for workstations that will need to handle demanding applications simultaneously. You will also need a high-end motherboard and memory modules to support them. Motherboards with Nvidia nForce 680i SLI (Intel) or Nvidia nForce 590 SLI (AMD) chipsets are the best for these processors. But be prepared to pay through your nose for this performance.

Friday, February 20, 2009

Boost your Windows XP Service Pack 3

It is a sad time for Microsoft. Vista hasn't been the success it was supposed to be, and with the lifecycle of XP coming to an end, there is an urgency at Redmond to produce something bigger and better, to keep Open Source operating systems like Ubuntu at bay.
Ever since Service Pack 3 for the XP operating system came out, there have been plenty of reported problems associated with it. Moreover, important features like the DirectX 10 graphics interface are exclusive to Vista. Despite these signs pushing you towards the newer OS, don’t think that it is absolutely necessary to discard XP with SP3 and switch over to Vista. If you do not wish to, use our tools and tweaks to extend Vista functions in XP and rectify the existing errors.

Updating with ease

Service Pack 3 comes with a proverbial flashing red button which, if touched, invites danger. Every Windows Update will now sneak in some software on PCs and ensure that users will suffer from headaches. Approximately 38 percent of the participants of an online survey have reported massive problems. They range from ‘XP no longer starts’ (16.86 percent) to ‘Error messages for license problems’ (6.13 percent).
If sporadic errors occur on your computer, visit the following blog for information:
http://msinfluentials.com/blogs/jesper/. Ironically, it is a blog by an ex-Microsoft employee who defected to Amazon a few years ago. Jesper Johannson offers solutions for the most important problems in SP3.

OEMs and AMD Compatibility:

Many PC manufacturers, amongst them HP, install their Windows OEM based OS on the perception that this has been manufactured using the Microsoft System Preparation Tool. At the same time, drivers for AMD and Intel systems are copied on the target computer. The IntelPPM driver is automatically activated and crashes AMD PCs. First try to boot the PC in the safe mode. After that start the script ‘removeIntelPPMonAMD.vbs’ from the CHIP DVD with next month’s issue. It's also available on Jesper's blog. It checks whether an AMD CPU exists and then disables the Intel driver. If you cannot boot your computer in the safe mode, boot it using the Windows Setup DVD and call the restore console with [R].

Enter the following command:

disable intelppm

However, if you do not have access to the restore console, which is the case with some OEM versions, then there is only one way to proceed and that is reinstallation.

Log file shows errors

If XP has been damaged to a large extent, take a look at the Update log
file. Use Notepad to open the following file in the Windows folder ‘WindowsUpdate.log’.

You can identify these entries by date and time. Open the new text in Notepad or Word and sift through it using the ‘Edit | Find’ command to find the words ‘Fatal’ and ‘Warning’. Enter the error description like ‘Failed to synchronize, error = 0x8024000b’ in the search line on www.microsoft.com. You will get some support or a patch. For more info and helpful tips for reading the Windows Update.log file, visit http://support.microsoft.com/kb/902093.

Old BIOS

Owners of Asus A8N32-SLI Deluxe motherboards were flabbergasted after installing SP3. Their computers restarted without any reason or displayed errors with messages like ‘STOP: 0x000000A5’. This error is caused due to an obsolete BIOS version. Their Advanced Configuration and Power interface (ACPI) is not compatible with SP3 and causes problems with drive management. Connecting another drive will solve this problem. Simply insert a USB stick and use it as a replaceable drive. If XP runs stable once again, update your BIOS from the motherboard manufacturer's website.

Is SP3 a malware?

Many worms delete Registry entries or write absurd information there. And SP3 does the same. The result is that the device manager no longer shows any devices, network connections fail, and thousands of new keys starting with ‘$%&‘()*+,-‘ are dumped in the Registry. It's no wonder that security programs classify SP3 as hazardous malware. In fact Norton Internet Security 2008 immediately tries to remove SP3. In the CHIP forum, we have also found instructions regarding products by Kaspersky and Trend Micro. A remedy is provided by the patch that you can find on the Microsoft website using the search string ‘KB953979’. Symantec also offers a patch to its customers. Ask the manufacturer for the file ‘SymRegFix.exe’ if you face similar problems.

WGA tests

According to Alex Kochis, Senior Product Manager at Microsoft, erroneous test codes were copied on to the Windows activation server that checks the authenticity of XP Professional online. The server could then no longer differentiate between legal and pirated copies of Windows. Even genuine customers can see only a black desktop and the prompt to buy a licensed Windows copy at the earliest.

In the meantime, the defective codes were removed. Users with a black Windows desktop should visit the website www.microsoft.com/genuine and click on ‘Validate Windows’. The authenticity check will then be re-conducted and Windows will be unlocked. If this does not help even if you have procured a licensed Windows copy, visit www.microsoft.com/genuine/selfhelp/support.aspx. Here you can see tips for troubleshooting and get technical support for the Windows Genuine Advantage program. We recommend not using dubious WGA deletion tools available on the Internet, since, without the authenticity check, you cannot download many updates like Windows Media Player 11 for XP from the Microsoft site.

The Vista bluff

Lack of support, crashes and false positives in the authenticity check are making the lives of XP users difficult. But still, few users see Vista as an upgrade to XP. After mulling over this for some time, Microsoft came up with a plan that will certainly go down in history: the Mojave bluff.The strategy started with a survey. Microsoft searched for customers who use Windows XP and have never worked with or have strong reservations against Vista. Eligible customers, approximately 70 in number, were then invited to San Francisco, where they were supposed to evaluate a strictly confidential and new Windows version. This operating system, codenamed ‘Mojave’, supposedly considered all wishes of XP users and, at the same time, had none of the disadvantages that are observed in Vista. Test customers thought that the new Mojave was amazing, until Microsoft told them the truth: the super Windows was a boringly normal Vista from which all revealing logos were removed.

Freeware XP

Windows XP's retail sales officially stopped least year, and even support will not be provided through updates after 2014. Of course, Microsoft still needs to sell Vista now, and not after a few years. Plus, under the Microsoft Piracy agreement, at www.microsoft.com/norge/piracy/activation_faq.mspx, the company has made it public that they might issue an update that will remove the need to contact an activation server at the same time. Users can then use XP without activation. So does this mean that XP will be freeware? Yes! From April 8, 2014, you might actually be able to use XP without activation. But the sad part about this is that users will not necessarily benefit from this, since the best features will be available exclusively in Vista and not in XP. A prime example of this is DirectX 10.

DirectX 10

The DX10 graphics framework is indeed available only in Vista. Microsoft has persistently refused to offer this feature in XP. If you want to play modern 3D games such as ‘Crysis’ with all the graphical effects enabled, you must buy Vista—or procure a pirated Russian version.

If you Google ‘dx10_xp.exe’, you can access an unofficial version of DirectX that you can download from Win Future (www.winfuture.de). It is a RAR archive that can be unzipped on your PC. It contains an installation file that executes all the steps automatically. DLL files that are normally included in a Vista installation are copied into the Windows directory. The DxDiag diagnosis tool has actually authenticated an existing DirectX 10 installation.We procured the demo version of the Crysis first-person shooter for testing. Only DirectX 10 can be used to select the setting ‘Options | System Settings | Advanced | Change all Settings to | Very High’. However, this was possible only with a new graphics card that supports DirectX 10, such as ATI’s Radeon HD2000 onwards or Nvidia's GeForce 8000 series onwards.Keep in mind that the manipulated version of DirectX that originally stems from Russia is however not yet fully developed. In Windows XP, games therefore run considerably slower than on an equivalent Vista computer.

Warning: Try these at your own risk!

Turn XP into Vista

You can easily and quickly emulate other Vista features in XP. Transformation packs and feature updates can be downloaded from the Internet. The advantage is that you can add some of Vista's neat effects without affecting your underlying XP installation.

For conversion, you will need the following tools from the web: ViOrb for Vista Start button, TrueTransparency for the Aero Glass window effect (www.crystalxp.net), ViStart for the Vista Start menu, Visual Tooltip for a small preview window in the taskbar, WinFlip for the 3D window effect, Aurora XP for the desktop background (http://falsecut740.deviantart.com/art/Aurora-XP-63775559), and Desktop Sidebar for the sidebar and widgets. You can adjust the Aero effect through ‘Sidebar| Options | Display | Download more skins’. Enter ‘Aero’ on the manufacturer’s site, download, double-click it and that’s it.

Other applications to convert XP into Vista include XPScene, which adds the Vista Ultimate Extra Dreamscene. You can then use high-resolution animated films that are available on www.dreamscene.org as your desktop background.

TrueCrypt allows another Ultimate Extra Edition to operate in XP: the hard disk encryption BitLocker. AveDesk allocates pictograms to specific functions. This is actually an Apple OS X feature, but impressively shows that not only can XP simulate Vista, but also surpass it by miles.

If you want to transform XP completely into Vista, first ensure that SP2, IE 7 and Media Player 11 are installed. You can download these from the Microsoft website (www.microsoft.com). If possible, also download Windows Defender, Windows Mail and Windows Live photo gallery.

If everything is ready, install all the Vista transformation programs mentioned in this article. Once the installation processes are completed and you restart your PC, you will need to do some fine-tuning. In ‘Welcome Center’, click on ‘Configure User Account | Apply Current Configuration’. Now you can select the ‘Windows Aero’ style in the ‘Display Properties’ window. After restarting the PC, close ‘Welcome Center’ and install AuroraXP. Use ‘Start | Run’ to open the ‘msconfig’ utility and enable the ‘NOGUIBOOT’ option in the ‘Boot.ini’ tab. Now install Visual Tooltip and, if required, change the size of the preview window. You can replace the ‘Windows Sidebar’ with the ‘Desktop Sidebar’ if you like.

If you want and still have enough computing power, then, install other enhancements like WinFlip for the 3D effect or Windows

Search for XP that provides the considerably quicker and more efficient search function of Vista in Windows XP.

Digital threats in Internet

From banking and shopping online, keying in our user IDs and passwords and confidently sharing our personal information at secure sites, these are everyday occurrences. Although it makes our life easier, our increasing online usage also makes us vulnerable to digital threats. When we enjoy the convenience of online banking, we invariably expose ourselves to phishing attacks. We download applications from the Internet and invite malware to take control of our computers. Email attachments may unknowingly bring in Trojans that might play havoc with our computers. However, if we exercised a little more caution, we could prevent the threat of malware from capturing our online identity. To do that we need to be aware of the different types of risks that exist, how they work and what can be done to safeguard our data against them.

Danger defined:
By and large, we tend to categorize all online threats as viruses. But what really is a virus? Historically speaking, a virus is a type of a computer program that not only infects your computer, but makes multiple copies of itself and proliferates within documents or applications on your computer. It also has malicious reprecussions like corrupting file content, denying access to databases, stealing personal information and the like. Back in the days of the floppy disk, an infected disk could infect a host computer if the user executed or copied files from it. This digital plague could further infect other floppy disks or other media if inserted into the host computer, thus replicating them. To prevent these viruses from spreading and damaging files, computer security firms developed applications that could detect and even remove viruses within files. In cases where this disinfection was not possible, the program would delete the file from the computer or move it to a secure location (much like a quarantine). However, today’s virus engineers are smarter. Drawing on the power of the Internet, there are very few viruses out there that still spread by physical media—most viruses proliferate through the Internet across various programs. This has given rise to worms that travel through local and web networks, Trojans that are capable of
camouflaging their presence and spy ware that can steal your data without your knowledge. Welcome to the new world of malware.

Computer worm:
In computer terminology, a Worm is a self-replicating threat that travels through a network and settles in a computer via a variety of online applications like e-mails, chat clients, P2P clients, etc. A worm does not attach itself to any program that explicitly needs to be executed for its spread. Instead, it travels through networked applications and primarily replicates itself up to a point where the network is clogged with its clones, preventing it from being used by legitimate applications. The different types of worms you could encounter are:

E-mail worm:
This type of worm uses e-mail as its vehicle. When an infected e-mail reaches your inbox, it does nothing unless the e-mail is opened to be read. When you open the mail, you may see an attachment or a link to a real or fictitious web site. The moment you click on the link and visit the web site, the worm gets triggered. Once activated, it starts searching your address book and sends e-mails to your contacts. It can even fake the sender’s address, so that the recipient assumes that the mail is not from someone he knows. Clearly, across an office network consisting of tens or hundreds of users, the numbers of fictitious e-mails traversing the mail servers grow exponentially over a short time. E-mail worms often bring down mail servers and clog their functioning.

File sharing network worm:
This worm generally proliferates through a shared folder of a machine. It creates a copy of itself and masks its intent by using a seemingly harmless and unassuming name. The moment you connect to a networking site like ‘kazaa.com’ and your sharing folder gets accessed, the copy of the worm moves from your computer to other computers in the file sharing network. With millions of computers actively being used to access files from peer-to-peer networks, these worms can proliferate very quickly. Another popular type of worm is the instant messaging worm (similar to the email worm, but uses an instant messenger service as its vehicle).

Trojan:
Trojans are malicious programs that pose as legitimate applications. When users execute such programs, blissfully unaware of their real intent, the host computer gets infected. Once on your computer, it may strike in a variety of ways, ranging from capturing what you see on your screen to logging what you type. The captured information is then sent to the author of that malware through the Internet. You could therefore stand to lose precious data, bank passwords and the like. The different types of Trojans include remote access Trojans, where others can gain access to and even take over your machine, data sending Trojans that scan your computer and send data to the author, and destructive Trojans that simply delete files on the host computer. Trojans can also infect your computer and you may face denial of service (unavailability of data). Trojans even have the potential to counter anti-virus software by changing their coding DNA (a process known as polymorphism), making it harder to detect. Some Trojans are developed such that they will only be activated on particular dates, or when certain pre-defined conditions are met by the computer. These Trojans are known as ‘Time bombs’ and ‘Logic bombs’ respectively. Spyware Like Trojans, Spyware is also a type of computer application, developed with the intention of stealing information from your computer. These applications can steal data including the history of web sites you have visited, passwords that you have used to access online secure services, etc . However, unlike Trojans and worms, spyware cannot replicate but it does exploit the host computer for commercial gain. These include everything from throwing unsolicited pop-up advertisements, capturing your web browser’s home page and directing it elsewhere. This type of application cannot spread by itself, therefore its efficacy depends solely on whether you choose to install the software. Since users wouldn’t intentionally install applications that are detrimental to their interest, spyware represents itself as a utility application, for example, a web accelerator, a free image utility, etc. Spyware often piggy-backs on to shareware applications found on download web sites or application CDs.

Adware:
Adware is more of an annoyance than a threat. Typically found in applications downloaded from questionable web sites, it infects the host computer by downloading and installing other advertising material and displaying it on your computer via annoying popups that appear while you use Internet applications. This is where adware generally gets confused with advertising-supported software. The latter is not malicious and only displays an advertisement within the window of the application program (such as trial or shareware versions of software). Adware, on the other hand, displays advertisements randomly, often when you least expect it.

The last call:
This new breed of Internet threats may or may not be harmful to users, but they do hamper the performance of computers. To protect computers from today’s digital threats, an anti-virus program is a good place to start. Look for application suites that specifically offer protection against all of these threats and not just ones that offer plain vanilla virus protection. In today’s world, data security requires blanket protection systems that do it all. You can also install anti-spyware and adware application like NoAdware, ErrorDoctor, Spynukke, AdAware, etc. Secondly, it is important to exercise caution on what applications and fi les are downloaded. This includes your mail attachments. Chain mails with attachments (such as .exe, .com, .scr, .bat, or .pif), download sites that contain links of questionable web sites, applications that aren’t from trusted sources should all raise a user’s alarm bells. Most of the time, the battle against malware can be won before it even begins—all it takes is a bit of vigilance.

Wednesday, February 18, 2009

To Book Cinema Ticket,Bus Ticket and Train Ticket Online

To Book Cinema Tickets Online in Chennai:
Please try out the following links..
BookMyShow.com
Limata.com
SangamCinemas
Mayajaal.com
InoxMovies.com
Eticketz.co.in
Cinemakaran.co.in
Ticketnew.com

To Book Bus Tickets from and to Chennai:
Please try out the following links..
Abhibus.com
Rathimeena Travels
Parveen Travels
KPN Travels
Ravibala Roadways
Redbus.in
Ticketkaran.in
Realindia.in
kumarionline.com

To Book Train Tickets from and to Chennai:
Please try out the following links..
IRCTC

IDM-Download at Ease

I am using this download manager for the past 3 years..i have tried different download managers and came back to IDM finally..Its the best download software available in the market..
Internet Download Manager is an intelligent download manager which loads files at five times the normal rate.
The software has a user-friendly interface, simply copy the download URL to the clipboard of the tool and it starts work. The tool is also capable of picking up interrupted processes where it left off. It also supports the segmenting function, all current browsers and server types and will not be confused by firewalls.
In this new version the developers integrated an FLV grabber. Sou you can for example download video files from YouTube.
To download this stuff,please click here
(iamansar.blogspot.com is not responsible for the content of this description. We encourage you to determine whether this product or your intended use is legal. We do not encourage or condone the use of any software in violation of applicable laws)

Nokia PC Suite Cleaner 3.6

If you are using Nokia cellphones and Nokia PcSuite software then this stuff will really help you out for various reasons..
Nokia PC Suite Cleaner will remove any data that is left on your computer after having uninstalled the Nokia PC Suite.
This freeware program will help you with any possible problems that may come with uninstalling the Nokia PC Suite. You can choose your type of problem from a drop-down menu during the installation and then the Cleaner will take care of it.
License:
Freeware
Operating systems:
Win XP/Win 2000
File size:
1.2MB
To download this free utility,please click here

(iamansar.blogspot.com is not responsible for the content of this description. We encourage you to determine whether this product or your intended use is legal. We do not encourage or condone the use of any software in violation of applicable laws)

Sunday, February 15, 2009

Amazing Video Software For You..

VirtualDub is a free Video Capture and Video Editing software. With this free download it is possible to work with large files, including those over 4GB.
VirtualDub also provides the user with the possibility of splitting the Audio and Video of a movie and much more, like video- and audiofilters. You can also
capture videos from several video devices onto your system. For example your TV-card or webcam.
Virtual dub is one of the best known video-editing-programms and it's free.
There´s a 64-Bit version at the author's homepage, too.

Features of VirtualDub:

- Fractional frame rates. Don't settle for 29 or 30 when you want 29.97
- Optimized disk access for more consistent hard disk usage
- Create AVI2 (OpenDML) files to break the AVI 2GB barrier and multiple
files to break the FAT32 4GB limit
- Integrated volume meter and histogram for input level monitoring
- Real-time downsizing, noise reduction, and field swapping
- Verbose monitoring, including compression levels, CPU usage, and free disk
space
- Access hidden video formats your capture card may support but not have a
setting for, such as 352x480
- Keyboard and mouse shortcuts for faster operation. To capture, just hit F6.
- Clean interface layout: caption, menu bar, info panel, status bar.
- Reads and writes AVI2 (OpenDML) and multi-segment AVI clips.

click here for download
(iamansar.blogspot.com is not responsible for the content of this description. We encourage you to determine whether this product or your intended use is legal. We do not encourage or condone the use of any software in violation of applicable laws)

Best SmartPhones That You Can Have a Look..

This is purely from my experience and knowledge
that i have come across few recommendations from
my friends circle regarding some best smart phones
available in the market..i have not provided deep
reviews here but these will surely help you out..
If you want to know any details regarding these
cellphones then you can reply to this post or just
enter the model name in Google and you will get it
in seconds..

India moving to 3G



Believe it or not,India is moving to 3G which will lease the new generation of digital life very soon.In Today's lifestyle, connectivity is one of the utmost important things.Right now India is working with GPRS and EDGE connectivity in terms of mobile broadband.

GPRS is a 2nd generation technologies and suffer largely from limited data transfer speeds. EDGE counts in as a 2.5G technology and so far this service is available in select major cities only. With the 3G spectrum being allocated and mobile operators bringing 3G services in early 2009, thing are set to change for the future. MTNL has already rolled out its 3G service, currently free for its users for a couple of months. Once the competition starts offering 3G services after the spectrum allocation in February 09, MTNL would also start charging for its services. Hopefully, the service charges for 3G would not be kept on an idiotically higher side.

As far as 3G services are concerned, a consumer who just uses the mobile for calling and SMS sending on a budget phone would not be the one getting affected by the service. On the other hand, an average consumer who knows how to use the browser on his mobile to access WAP content, 3G would open doors to new dimensions. Not only would the website rendering time decrease, application, audio and video downloads would be done in a blink. One touch uploading of files directly from phones to sharing sites such as OVI, Flickr and Youtube would take mere minutes to complete. For power users, 3G would be a god sentgift as a 3G network is capable of providing speeds upto 40 times faster than the current 2G network.

Looking at the Impact that this revolution in mobile broadband would make in 2009 – Once implemented properly and made available to the public at large, more and more people would be able to download large files on their phones, check email instantly, watch live streaming videos as well as make video calls right from the phone itself. Professionals would not have to travel from one place to another for meetings, it would be possible to do that from the phone itself. People would be able to share multimedia content at ease. Mobile blogging would get a serious boost up due to increased upload speeds with more and more people using their phone's to submit content online directly.

WiMax on the other hand is the technology that would change the way broadband is accessed on the desktop and laptops. No longer would one need to connect Ethernet wires for accessing Internet. Everything would become wireless and that too spread across a wider coverage area. Simply put, WiMax is WiFi put on adrenaline. It is capable of shared data rates upto 70Mb/s. Once implemented, it would be able to support over a thousand times at 1Mb/s DSL level connectivity leading to easy creation of Wide Area Networks. Offices would not need to have cables put down here and there as they can work on a single WiMax connection. Gamers and Home users would be able to share data and play games with each other without any eminent lags or disconnections.

The biggest Impact that we would get to see is the increase in the number of broadband users across India. With connectivity reaching new standards more and more device manufacturers would launch budget products for consumers and this would further help in increasing the Internet user base in India.

Optimize your PC

I am very much impressed with the way TuneUp Utilities 2008 has worked..
If you do have a desktop or laptop and you want to get maximum performance but if you feel that you are not so techy,then the one and only utility that comes for yours help is TuneUp Utilities 2008/2009.
Now i shall give you few tips and tricks as how to get the maximum output from yours desktop and laptop using TuneUp Utilities 2008..
There are six main modules in this optimization tool.
The ‘Increase performance’ modules consists of ‘TuneUp Drive Defrag’ which defragments the hard disks, ‘TuneUp StartUp Manager’ controls which programs require to be executed at Windows startup, ‘TuneUp System Optimizer’ which apart from speeding up the system, offers tips for system configuration, ‘TuneUp Registry Defrag’ corrects physical errors in the registry and defragments it, ‘TuneUp Memory Optimizer’ monitors and optimizes free memory in the background.

The ‘Free up disk space’ module removes unnecessary files and backups, deactivates selected Windows functions that take up particularly large amounts of disk space, and comes with a ‘Disk Space Explorer’ that provides information about the disk space usage of your system and helps you clean up your hard disks.

The ‘Maintain Windows’ module contains the ‘TuneUp 1-Click Maintenance’ feature which cleans up the system and defragments the local hard drives at the click of a mouse button, and ‘Registry Cleaner’ removes invalid entries and references from your system. ‘Disk Doctor’ finds and corrects errors on the drives, ‘Repair Wizard’ corrects frequently occurring Windows problems quickly and easily, ‘Undelete’ recovers files that have been deleted from the Recycle Bin, ‘System Control’ allows you to control the look and feel of the Windows interface, ‘Styler’ lets you change the Windows symbols, logon screens, the Welcome screen and the visual style, ‘Process Manager’ allows you to manage currently running programs, ‘Registry Editor’ helps you to edit and browse the registry, ‘Shredder’ deletes important (selected) files securely, ensuring that they cannot be recovered later, ‘System Information’ provides comprehensive information on your computer, and the ‘Uninstall Manager’ uninstalls programs you do not really use anymore.

Step 1: Defragment the hard drive

Step 2: Trim the system startup list

Step 3: Optimize your PC’s local network

Step 4: Defragment the Registry file

Step 5: Free up the system’s memory

Step 6: Free up disk space

Step 7: Diagnose the PC’s file system

Step 8: Fix computer and display problems

you can find the trail pack here

(iamansar.blogspot.com is not responsible for the content of this description. We encourage you to determine whether this product or your intended use is legal. We do not encourage or condone the use of any software in violation of applicable laws)


Saturday, February 14, 2009

My Nokia 6120c Review..


For a very long time i have been using nokia 6230i(now too using it..life timer is 1021)..i never thought of changing the model as i always feel comfortable with that sucessful model..
But from the introduction of N73 i was very fond of getting it..but i felt that it cant be as comfortable as 6230i since its very compact..so times passed by..
now they launched 6120c which will do eve
rything as N73 does..except camera..but no problem for me..i have digicam also..so i liked the sleek interface of 6120 classic,its speedy operation of S60v3 operating system 9.2 fp1 device..
Nokia 6120c has 4 main advantages that are not even owned by the Nokia N73, which are more expensive.
1. Internet connection HSDPA (3.5G).
Nokia 6120c supports Internet access speeds up to 3.6Mbps HSDPA, which means that the speed maximalnya 10x faster than 3G Internet connection (384Kbps).

2. The processor more quickly.
Nokia 6120c using 369Mhz processor speed, which means far more quickly than the processor used by the Nokia N73 and N70.

3. Version of the new operating system
The Nokia 6120 using the Symbian operating system with a newer version instead used on the Nokia N73 and N70.

4. Slim and lightweight design
Even equipped with a faster processor and HSDPA chip level 2 (3.6 Mbps), but Nokia 6120c to fix it all in the design of more than Slim and lightweight Nokia N73, N70, especially.

sure..to point out disadvantages
1.We cant take pictures like N73 which owns 3.2 carl zesis lens..ofcourse its one of the best..

2.Cant feel the two stereo sound system like N73..

Overall N6120c is in the winning category with the extremely low cost tag price..
so go for it..

Friday, February 6, 2009

All About Google Adsense

Google Adsense is best CPC advertising program that makes you earn money from site by serving ads. Google adsense ads include, adsense for search and referrals. This is a summary of adsense tips and tools to earn more money from Google Adsense.

Google Adsense Official Guidelines

Adsense Beginners Interactive Demos

Adsense Alert, Statistics and Clicks

  • Adsense Notifier - Firefox extension that displays your Adsense earnings on the Firefox statusbar.
  • Adsense Alert - desktop client monitors your adsense earnings.
  • AdLogger - an open source Adsense tracker designed for web publishers and website owners.
  • Google AdSense graphs - chart your adsense data in a multidimensional line charts.

Test your Google ads

Google Adsense Optimization Tips

Adsense Forums & Discussion Boards

Make Money Through Yours Blog..


There isn’t a lot of secret on how to make money online from your blog. Blogs with or with no traffic can be monetized – you just have to know the ways. Here are some of the techniques that I use to make money online from my blog.

1.PayPerPostYour blog just needs to be approved by their team (which is rather tedious and time consuming if you are not using WordPress or Blogger) and you can start writing paid posts to make money. Generally advertisers don’t really emphasize on traffic but uses PR as a benchmark.Here is an guide on how much you be able to earn with your PR on one paid post:

PR0 – 4 – $5 - $15
PR5 – $20 - $100
PR6 and above – at least $100 - $200 and above

You as well can earn referral fee of $7.50 to $15 when a new publisher signs up using your referral link.You can sign for PayPerPost here

2.BlogsvertiseCool opportunity but you not able to shop around the market place since there are not much advertisers. You’ll need to wait till the admin to give you with a task.

Normally I get paid $5 - $10 on my PR1 to PR4 blog.You can sign for Blogsvertise here

3.SponsoredReviews – This is my favorite place. Your blog’s approval is quite fast and simple. After get approved, just browse around their market place and bid for that for your desire opportunity, as many as you want!! If the advertisers agree with your bids, you will get an email for the jobs task.

I get paid $3.25 to $200 per blog post on my PR2 and PR5 (now is PR4) blogs.You can also earn $5 and up to $175 each referral you refer to them.You can sign for SponsoredReviews here

4.PayU2BlogThis is another place to earn money online through blogging. Similar SponsoredReviews, blog approval is easy, but sometime you wont get any email from them if your blog is not qualify. You’ll get tasks assigned to you weekly and normally you have to complete it within a week.

I get paid $5 to $7.50 for each paid post.You can sign for PayU2Blog here

5.SmortyIt’s very simple to get approval by them if you have your blogs get indexed in google. No question ask, just do what they want, and then you can get pay in just 1 week period. Smorty is the fastest payment ever in paid blogging service.

PR0-4 blogs get paid from $6 to $20 for a blog post.You can sign for Smorty here

6.ReviewMeThey are growing. In the past they just focus on advertising posts on blogs for a payment fees, you can’t choose the advertisers, advertisers choose you. At the moment they have a market place where you are able to choose on these advertisers.

You earn 50% of what you have ask for your premium paid post sales, while you can earn $5 to $7.5 for a PR3 blog in their market place.You can sign for ReviewMe here

7. V7N PR is more important for them. They do not accept free blog platform like blogspot, etc. V7N suit for you after you have your own domain name.

Normally I will get paid at least $10 for one blog post however I heard that somebody got paid for $20 per post. You are able to negotiate your price with them if you have high PR blog.You can sign for V7N here

There are a lot of paid blogging opportunities but I don’t recommend you go with them due to some reasons. These are Bloggerwave, loudlauch,and so on..

Wednesday, January 28, 2009

Fire Services and Police in chennai

POLICE PERSONS Telephone
Commr.of Police 28555064
Joint Commr Traffic 25381076
Joint Commr South 28555046
Central 28555075
North 28555253
Dy Commr Traffic South 25384975
Dy Commr Traffic North 25383399
Dy Commr Adyar 24420553
Ashok Nagar 22334993
Annanagar 26215135
Triplicane 28555043
Flower Bazar 25359200
Guindy 22334993
Asst.commr.l and o Guindy. 22341539
Asst.commr.l and o Saidapet. 24330227
Asst.commr.l and o T.nagar. 24838428
Asst.commr.l and o Adyar. 24913552
Asst.commr.l and o Mylapore. 24980838
Asst.commr.l and o F.bazar. 25226545
Asst.commr.l and o Washermenpet. 25244040
Asst.commr.l and o Harbour. 25352315
Asst.commr.l and o Port Marine. 25364189
Asst.commr.l and o Triplicane. 25367100
Asst.commr.l and o Pulianthope. 25515494
Asst.commr.l and o Royapuram. 25955347
Asst.commr.l and o Anna Nagar. 26267641
Asst.commr.l and o Thirumangalam. 26287124
Asst.commr.l and o Kilpauk. 26421162
Asst.commr.l and o Sembium. 26423753
Asst.commr.l and o Egmore. 28528432
Asst.commr.l and o Royapettah 28532909
Central Zone Arumbakkam Ps. 24757220
Central Zone Choolaimedu Ps. 24836226
Central Zone Vepery Ps. 25325191
Central Zone Govt. Estate. 25360209
Central Zone Anna Square. 25362327
Central Zone Periamet Ps. 25362964
Central Zone Triplicane Ps. 25365610
Central Zone Peravallur. 25500656
Central Zone Kolathur. 25502761
Central Zone Sembium Ps. 25571298
Central Zone Thiru Vi Ka Nagar. 25585500
Central Zone P.t.j.nagar. 26258981
Central Zone Aminjikarai Ps. 26261276
Central Zone I.c.f Ps. 26263919
Central Zone Villivakkam Ps. 26264798
Central Zone Thirumangalam. 26265126
Central Zone Anna Nagar Ps. 26266296
Central Zone Mental Hospital. 26421085
Central Zone Sectt. Colony. 26424752
Central Zone Ayanavaram Ps. 26440649
Central Zone T.p.chatram Ps. 26449122
Central Zone Rajamangalam. 26500575
Central Zone Egmore Ps. 28250952
Central Zone Women Child Hospital 28251982
Central Zone Kilpauk Ps. 28255307
Central Zone Chetpet. 28260246
Central Zone Nungambakkam Ps. 28272032
Central Zone A.w.p.s.(c). 28291134
Central Zone Anna Salai. 28521720
Central Zone Zam Bazaar. 28532225
Central Zone Chintadripet Ps. 28535680
North Harbour Ps. 25210475
North Elephant Gate Ps. 22221244
North A.w.p.s.north. 25225873
North Old Washermenpet Ps. 25231442
North Kothawalchavadi. 25234012
North Muthialpet Ps. 25247473
North Stanley Ps. 25261346
North Seven Wells Ps. 25270689
North Pulianthope Ps. 25322937
North Basin Bridge Ps. 25322948
North North Beach Ps. 25340598
North Esplanade Ps. 25340967
North Flower Bazar. 25353682
North Fort Ps. 25360965
North Port Marine. 25364189
North Kodungaiyur. 25376241
North Mkb Nagar Ps. 25514888
North Vyasarpadi Ps. 25515302
North Fishing Harbour. 25951014
North Thiruvottiyur. 25951512
North Korukupet Ps. 25951567
North Thondiarpet Ps. 25951648
North Royapuram Ps. 25951984
North Radhakrishnan Nagar Ps. 25952931
North New Washermenpet Ps. 25953621
North Kasimedu Ps. 25954863
North Otteri Ps. 26423700
South Zone Guindy Ps. 22341539
South Zone Velachery Ps. 22450608
South Zone Saidapet Ps. 24330571
South Zone Mambalam Ps. 24344845
South Zone Teynampet Ps. 24349795
South Zone A.w.p.s. 24415732
South Zone T.nagar. 24748880
South Zone Virugambakkam. 24835107
South Zone K.k.nagar Ps. 24838763
South Zone Kodambakkam Ps. 24838902
South Zone Shastri Nagar Ps. 24903121
South Zone Thiruvanmiyur Ps. 24911350
South Zone Kotturpuram Ps. 24913472
South Zone Adyar Ps. 24913552
South Zone Foreshore Estate Ps. 24941479
South Zone Mylapore Ps. 24980100
South Zone Marina. 24985602
South Zone Abhiramapuram Ps. 24995905
South Zone Royapettah Ps. 28264955
South Zone Pondybazaar Ps. 28283870
South Zone Ashok Nagar Ps. 28293958
South Zone Ice House Ps. 28524870
South Zone Royapettah Hospital. 28532909


Fire Station Telephone
Ambattur 26251601
Athipattu 4.119E+09
Avadi 26555202
Deputy Director Of Fire
Service,northern Region.
8512999
Director Of Fire Service 8554156
Divisional Fire Officer State Training
School and State,Workshop.
8585758
Divisional Fire Officer
South Division.
4894746
Divisional Fire Officer, North Division. 5342495
Egmore and Pbx Connection To
23 Fire Stations Of Chennai city
28554309
Ennore 25733633
Fire Control Room 25941149
Fire Control Room 101
J.J.nagar 26563629
Koyambedu 24872620
Manali 25941147
Poonamallee 26274700
Raj Bhavan 22354835
Red Hills 26418468
Tambaram 22382204
Villivakkam 26174718