Posted by Unknown
1 comment | 03:12

17000+ Free classified updated list only in 1000 Rs.
Mobile  : 9970176166

 100 + Classified List US

Posted by Unknown
No comments | 05:57


Win+Arrow Down
Set window to Restored (if Maximized) or Minimized (if Restored)
Win+Arrow Up
Maximize window (if Restored)
Win+Shift+Arrow Down/Win+Shift+Arrow Up
Maximize Restored window vertically / Restore window to previous state
Win+Arrow Right/Win+Arrow Left
Move Restored window to left/center/right. Works across multiple monitors
Win+Shift+Arrow Right/Win+Shift+Arrow Left
Move window to left monitor / to right monitor when using multiple monitors
Opens the title bar menu
Restore Window
Maximize Window
Minimize Window
Turn full page view on or off

Cycles through open programs in taskbar. Hold alt and continuously press tab to move forward between applications. Release keys to switch to application selected. Add shift to reverse direction.
Alt+Ctrl+tab, then use arrow keys to select application
Cycles through open programs in taskbar without needing to hold alt continuously. Pressalt+ctrl+tab once, then continue with arrow keys and press enter on application.
Cycle through programs on taskbar in the order they were opened or accessed
Cycle through programs using Aero Flip 3D
Cycle through programs on Taskbar using Aero Flip 3D
Cycle through Gadget Window
Minimize all windows on all Monitors. Press again to restore previous state
Minimize all windows on current Monitor
Restore previously minimized windows on current Monitor
Set all windows to Minimized on current Monitor except active
Preview Desktop / make windows transparent (May not work with all Settings)
Start Windows Explorer (in My Computer)
Open the Run window
Open Windows Search. F3 on empty desktop works, too.
Lock the keyboard/ computer
Display Windows Help
Change keyboard language layout if multiple language layouts are active*
Shift when inserting CD or DVD
Prevent CD or DVD from automatically playing
Choose Presentation Display Mode
Open Mobility Center
Win or ctrl+Esc
Activate Start Button. Then use arrow keys, space and enter to navigate within Start Menu
Go to first item in taskbar, continue with arrow keys
Go to first item in system tray
Shift+click on a taskbar item
Start new instance of taskbar item
Ctrl+Shift+click on a taskbar item
Start new instance of taskbar item as administrator
Shift+right-click on a taskbar item
Show the window menu for the program
Switch to application in position N on taskbar (or launch pinned application)

Start new instance of taskbar item in position N on taskbar
Arrow Keys
Navigate between and select single icons on desktop (when focus is on the desktop)
Select first / select last object on desktop
Launch active icon
Activate context menu of active icon by simulates right mouse button. Once in the context menu use arrow keys, a-z and enter to select item
Tab, shift+tab on empty desktop
Navigate between desktop, the quick-launch bar, task bar and notification bar. Then usearrow keys and enter or space to activate specific icons
Start Windows Explorer (My Computer)
Alt+Arrow Up
Go up one folder
Alt+Arrow Left/Alt+Arrow Right
Go to previous folder / go to next folder
Switch focus forward/ backward between Address bar, Search Bar, Toolbar, Navigation Pane, and File List (Default is usually File List)
Alt+d or f4
Jump to the Address bar and select absolute address. Copy address withctrl+c if desired
Ctrl+e or ctrl+f
Jump to Search Box in Explorer
Open new instance of Windows Explorer
Arrow Keys
Navigate between files and folders
Open folder or start application
Jump to first / jump to last item
Change the file name of active item
f2, then arrow left/Arrow Right
Move one character to the left / to the right in item name
f2, then ctrl+Arrow Left/Ctrl+Arrow Right
Jump one word to the left / to the right of item name
f2, then home /End
Jump to beginning / jump to end of item name
f2, then ctrl+a
Select complete object name including suffix (default excludes suffix)
Arrow Left/Arrow Right
Expand folder / collapse folder (navigation pane only)
Move forward / move backwards through tabs
Move forward / move backwards through options
Alt+underlined letter
Perform the command (or select the option) that goes with that letter
Replaces clicking the mouse for many selected commands
Select or clear the check box if the active option is a check box
Arrow Keys
Select a button if the active option is a group of option buttons
Display the items in the active list
Open a folder one level up if a folder is selected in the Save As or Open dialog box

Posted by Unknown
No comments | 04:26

Cloud Computing is becoming next stage platform in the evolution of the internet. It provides the customer an enhanced and efficient way to store data in the cloud with different range of capabilities and applications. The data in the cloud is stored by the service provider. Service provider capable and having a technique to protect their client data to ensure security and to prevent the data from discloser by unauthorized users. This paper, will gives a descriptive knowledge regarding cloud computing privacy and security issue provided by encryption and decryption services. If a cloud system is performing a task of storage of data and encryption and decryption of data on the same cloud then there are much more chances of getting access to the confidential data without authorization. This increases the risk factor in terms of security and privacy. This paper helps us on proposes a business model for cloud computing which focused on separating the encryption and decryption service, from the storage service provided by service provider. I means that both encryption and decryption of the data can performed at two distinct places.

For studying this proposal are using a business model named as CRM (customer relationship model) for an example. For the evaluation of effective an efficient technique of data storage and retrieval we are providing three clouds separately such as including encryption and decryption services, secondly storage and a CRM application system. In this Research paper, we have tried to access separate encryption and decryption service using RSA algorithm and computing is a paradigm in which information is stored in servers on the internet. That information retrieved by the client as per usage. For this manner, we provide us a solution for data security, confidentiality and privacy based on a concept of separate encryption and decryption service.

Posted by Unknown
No comments | 02:23

Unlock the Hidden Themes:

Windows 7 has a pack of hidden and locked themes. To unlock the hidden themes:

1. Go to C:\Windows\winsxs

2. Enter “*.theme” in the search feld. You will get the Click me prompt

3. Double-click the themes ZA, US, GB, CA, AU to install them.

Get Exact Colors On Your Screen

If you are an artist or you work with colors, use the Calibrate Color option in the Control Panel Display applet or run dccw.exe from the Start Menu search box. You can adjust gamma, brightness, contrast, and color balance, ensuring that colors are displayed correctly on your screen.


If you are usually sharing your computer with someone else, then you might want to restrict their access to your applications, files or documents. Using the AppLocker tool, you have a few options to do this by blocking other users to access Executables, Windows Installers, Scripts, a specific publisher or path.
You can simply do this by pressing the Windows key then typing Gpedit.msc. Then go to Computer Navigation -> Windows Settings -> Security Settings -> Application Control Policies -> AppLocker. Right click on one of the options (Executables, Installers, or Script) and create a new rule. That should save you from a lot of headaches.

Background Photo Slideshow

If you are like me, lazy and bored, then you will want to change the background from time to time, wasting a lot of time. Now you don’t have to do this anymore, because you can set up a slideshow.
Right click on the desktop then go to Personalize -> Desktop Background and hold the CTRL key while choosing the images. Then you can choose the time intervals between images and opt to display them randomly or in a row

Custom Power Button

There is an option to replace the “Shut Down” button with another action, if you rarely shut down the computer, but you more often restart it or put it on sleep.
Right click the Start Button, go to Properties and choose the ‘Power Boot Action” to do whatever you want, from the given options.

Posted by Unknown
1 comment | 23:38

The concept of cloud computing is a very vast concept which is very efficient and effective security services. The cloud computing methodology is a conceptual based technology which is used widely now a day. But in data privacy protection and data retrieval control is one of the most challenging research work in cloud computing, because of users secrete data which is to be stored by user. An enterprise usually store data in internal storage and then tries to protect the data from other outside source. They also provide authentication at certain specific level. To overcome this limitation, we are presenting some approaches that do not require complete dependency on the external security provider. In cloud computing, the data will be stored in storage provided by service providers which has no control of user. Service provider must provides the authentication for valid user otherwise the security must reduce and the cloud computing system may collapse. It’s a service provider’s responsibility to save the end user’s private data. For the above issues regarding security and privacy, this paper implies some efficient ways to overcome the limitations and drawbacks of cloud computing. 

This paper mainly proposes the core concept of secured cloud computing i.e. it suggests the cloud computing based on separate encryption and decryption services from the storage service. This paper introduces a user interface model i.e. Customer Relationship Management (CRM). The CRM is actually a connecting application which connects user to any system. So we purposefully uses CRM for user interface. A CRM service is described in this paper as an example to proposed business model and usability for end user. This service consists of three cloud systems, which are an encryption, and decryption system, a storage system, and a CRM application system. One service provider operates the encryption and decryption system while other providers operate the storage Even for security and data integrity we supposed to implement the One Time Password Authentication (OTP) including email updates and application systems, according to the core concept of the proposed computing model.