This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

All about cleaning your Registry:

A long time ago, in a land forgotten by time (before Microsoft Windows 95), Windows computers and their programs had .ini (configuration) files that stored information. These files determined how a program ran, its environment, and a host of other things.

Then the Windows Registry came onto the scene, with each key in the registry being similar to a bracketed heading in the old .ini file and values similar to entries under the .ini headings. However, registry keys can have nested subkeys with string or binary data that .ini files don't support. Does the registry periodically need cleaning? Let's take a look.
Hives and keys?

A registry hive is a group of keys, subkeys, and values in the registry that has a set of supporting files that contain backups of its data. The registry has gone through very little changes, so if you're interested in learning more about it, check out " What's all the buzz about registry hives?"

If you're not too familiar with the registry and how it works, there are a slew of different companies that would like to sell you a registry cleaner. Do you need to clean your registry? Let's look at the facts.
What registry cleaners claim to do:

What do registry cleaners claim to accomplish? Well, some of them claim to reduce the size of the registry and remove orphaned entries to speed up Windows. Sure, removing orphaned entries will reduce the size, but today's hard drives have gigabytes of free space and 10 MB isn't going to make a difference.

Besides, no one can give you a benchmark telling you how much speed you'll gain. The reason they can't tell you how much faster your system will run is because the size of the registry has nothing to do with the speed at which your machine operates.

The .ini files are flat text files, which require sequential searching. Registry files are database files, complete with indexing. If the index is up to date — and the system rebuilds it after each change, so it probably is — then size makes no difference.

Other registry cleaners say they'll remove invalid registry entries that can cause errors in other installed programs. Programs keep registry entries in their own keys and rarely reference keys written by other programs. They also include an uninstall routine that deletes the entries when you remove the program.

Many older programs may not work this way, and maybe some of today's programs don't do the best job of clearing their entries. However, the system will never reference the data that they leave behind.

Some registry cleaners claim that they correct problems with Windows crashes and error messages. I've been an administrator on Windows machines since NT 3.5, and I've never traced a crash or error message to the registry — nor have I met any administrator who has.

Finally, some registry cleaners say they remove entries pointing to nonexisting files that are invalid and require deletion. If a registry entry points to a file that's no longer present, of course you can delete them. However, if an entry points to something that doesn't exist, then the system will never use it. Do you delete every unused file on your computer?
Who needs registry cleaners?

There are two types of people who possibly might need registry cleaners. The first are those people who open up the registry and make manual changes. These people know exactly what they're doing; they follow precise instructions from the manufacturer, or they just like to tinker around and see what happens. This group might need to undo what they've done and could use a registry cleaner.

The second group of people who definitely need to clean their registries are programmers and developers. During the development of a program, you might go through hundreds of install/uninstall routines. It's important to ensure that you're working with a clean machine to make sure previous problems don't interfere with the latest version of your software.
Final thoughts:

If you're a developer or someone who fiddles with the registry, then by all means find yourself a good registry cleaner. As for the rest of us, leave the registry alone, and don't buy into the hype of needing to clean your registry.

Add sound to almost every event in Windows

Single-click the Start menu.
Single-click the Control Panel.
Single-click the Sounds, Speech, and Audio Devices icon.
Single-click the Sounds and Audio Devices icon or the text labeled "Change the sound scheme."

Make sure you're on the Sound tab and locate the pull-down menu under Sound scheme.
Select the Windows Default option and press Apply. Windows will ask you if you want to save the previous sound scheme. Since there wasn't a sound scheme already loaded, just choose No.

If you look under the text labeled "Program events," you'll be able to sample your new sounds or customize them with your own.

Add Radio to Your Internet Browser


Add a highly interactive and good music internet american radio channel to your internet browser now!! Enjoy your surfing and work with this awesome radio channel...latest songs /gossips etc....
Over 30 plus internet radio stations playing rock,pop,rap and best chart busters.
Download size below 436Kb
To download : click the radio image or here: Download Mirror 1

You can submit radio station requests or genre request.The toolbar will be updated automatically.Spread the word.

Add Orkut Profile to Your Blog!


You can add Your Orkut Profile to Your Blog as mine.
Instead of having same old Blogger Profile.
Just click on “Add to Your Blog” button on right side bar.
Now it will direct you to Add Wideget Page of blogger.
If you have multiple blogs, select for which blog you want to add.
Then click on edit content & here you need to change feilds “Your Image URL”,
“Profile URL”,”Compose URL”,”Scrapbook URL”,”Testimonial URL” & “Teaser URL”
with your actual URLs.
After editing click on “Add”.
That’s it you are done! Your profile will be embedded into your blog!

Note:
For Send Teaser & Write Testimonial URLs you need to sign in as a different user.

Displaying orkut profile in sidebar looks more good than your normal blog’s profile. If you are a blogger then you are just few clicks away from inserting it.Click here for more details. If you are not a blogger, here is the way to insert orkut profile in your blog or web site. Copy HTML code below & paste it in your page where you want to display orkut profile. Don’t forget to edit “Image URL”,”Profile URL”…..etc, with your appropriate profile links.
These URLs you can get by logging in to orkut & for image url right click on your pic & click on copy image location.Similarly for profile URL right click on “Profile” & click on copy shortcut. Replace these copied URLs with “Image URL”, “Profile URL” respectively. Procedure to get other URLs will be same.Do message me if you find this difficult.I will try to give you completely customized HTML code for your profile which doesn’t need any editing.
This HTML & graphics were created by Darnell Clayton of Inside Orkut


Accessing Xml Using Java Technologies

The most important benefit of XML is its simplicity. Though it is simple it is powerful enough to express complex data structures. Java is one of most important programming languages that is used for creating your web pages.
It is an object oriented language whose main purpose was to be used with embedded systems such as cell phones. But later it gained more importance to be used with Web pages that were dynamic in nature. Java Applet and serve lets are the important mechanisms for implementing this.

Customizing the Start Menu

Another advantage of using Java is the concept of JavaBeans, which is a software component model for Java that allows the rapid development of an application by using a visual builder. DOM is one of the methods for accessing the structure of an XML document.

An alternative is to use an event driven API. SAX is a simple API designed for XML. Document Handler is very important since it is called every time an element is found.

A Document Handler is used as follows:

Step 1: Importing the parser interface
Step 2: Create an instance of SAX driver.
Step 3: Using this driver, create a parser object
Step 4: Register an instance of class My Handler as a Document Handler.

JOX is a set of Java libraries that allows you to transfer data between XML documents and JavaBeans.

JOX matches XML document to the fields of a bean and it will use a DTD when writing an XML document when one is available. JOX, unlike the other libraries, allows you to use any form of an XML document and any Java Bean without creating a separate schema to describe the mapping between Java and XML.
XP is an XML parser written in Java. The following are the advantages of XP:
* XP is designed to be 100% conformant and correct
* XP aims at High performance
* Apart from the high level parser API, it also provides a low level API that supports the construction of different kinds of parser.

Breeze XML Binder is the most complete Java/XML data binding solution available. Breeze creates JavaBeans directly created from the XML structures.

Accessibility Keyboard Shortcuts

Accessibility Keyboard Shortcuts
Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)
Windows Explorer Keyboard Shortcuts
END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)

A trick to Hack MSN

Hacking MSN is actually VERY simple. Msn is designed to route the connection through a microsoft server while you are chatting. However, when a file is sent, a DCC (direct connection) is created. This was purposely done because otherwise microsoft would waste alot of bandwidth so a direct connection is made. This is your chance. Make a file transfer occur between u and a victim (try to send a big file), open up your command prompt (run "cmd" in NT/XP or "command" in 9X to get into prompt) and run netstat. usually the MSN targets IP would be above port 2000.