Welcome to TechProceed

An ever growing website consists of top quality article collections pertaining to Latest Technology, Cool gadgets, Computers, Mobiles, Software, Guides, How-Tos, Downloads, Tips and Tricks, Virus removals, Troubleshooting, Entertainment, etc

Bluetooth devices are very common nowadays. By using this technology it is so easy to share files between very different devices. If your computer or laptop has a Bluetooth dongle or built-in module, Windows 7 can use it for exchanging files with other Bluetooth enabled devices such as mobile phones, iPods, iPhones, PSP devices, etc. In this guide I will show you how to verify that your dongle or built-in module works, how to connect your computer to another Bluetooth enabled device and how to exchange files between them.


Verify that Bluetooth is Working Correctly

The first thing you should do before starting a Bluetooth connection is to make sure that the Bluetooth dongle or integrated module is inserted in the computer and turned on.
Windows 7 will then install the drivers needed for the Bluetooth device. It has drivers for most Bluetooth dongles and built-in devices but, if it's not able to find any suitable drivers for it, then you should install those which are bundled by the manufacturer of your product via an install disc or on its official website.
Next, you will see a Bluetooth icon in the system tray or notification area which means that Bluetooth is active.

Bluetooth

If it is not active, you'll have to enable Bluetooth on your computer. By default, the wireless and Bluetooth connections are active. If, for some reason, they're not, look for a button on the surface of your laptop that should enable both wireless and Bluetooth connections. If you can't find that button please read the laptop's manual to find it and learn how to turn on Bluetooth.
Now, you need to make sure that the Bluetooth works properly. Type in the Start menu search box the word bluetooth and click on the 'View devices and printers' search result. Another way is to go to 'Control Panel -> Hardware and Sound -> Devices and Printers'.

Bluetooth

In the new window you will see a list with all devices and printers that are connected to your computer. The Bluetooth dongle or integrated module will be on that list as well. If your Bluetooth device has a yellow exclamation point on its icon it means that there is a problem with it. Otherwise it means that the device is working properly.

Bluetooth

If the device has problems, select it and then click on the Troubleshoot button from the top menu. Follow the wizard's instructions and hopefully, Windows will find a solution to the problem.

Bluetooth

NOTE: If the device that you want to connect via Bluetooth to your computer has specific software applications made exactly for this kind of task, I recommend you to use that software. For example, if you have a phone with Bluetooth support it is a good idea to use that phone's "PC Suite" application on your computer.

Connect a Device to Your Computer Using Bluetooth

First you need to make sure that your computer can be seen by the Bluetooth device. In other words, you need to make sure the computer is discoverable via Bluetooth. You can access the Bluetooth settings on your computer by right-clicking the Bluetooth icon in the system tray or notification area, and selecting 'Open Settings'.

Bluetooth

Or you can simply search in the Start Menu's search box for bluetooth and click on the 'Change Bluetooth settings' search result.

Bluetooth

The Bluetooth settings window will now open. In the Options tab, at the Discovery section, check 'Allow Bluetooth devices to find this computer'. This will allow other devices to see your computer. When done, click on OK.
NOTE: Enable this option only if you want the Bluetooth device to find and connect to your computer. The other way around, connecting from the computer to the device, works without having this option enabled.

Bluetooth

Next, you have to activate Bluetooth on your device. Search for discoverable devices, select the computer and pair with it. Then you have to enter a password for this connection. On your computer you will see a system notification about a device that wants to connect with it. Click on that balloon or, if you missed it, double click on the Bluetooth icon from the system tray or notification area.

Bluetooth

In the new 'Add a device' window you have to type the same password as you did in in the device that is connecting to the computer. Then click on Next.

Bluetooth

Now Windows 7 will search for drivers and it will install them for the device that is connecting to your computer. To verify that the device has been properly installed click the Devices and Printers link from the 'Add a device' window.

Bluetooth

There you can also see if the device is working properly or if it requires troubleshooting.
NOTE: If Windows doesn't find suitable drivers for the Bluetooth Peripheral Device, don't worry, you will still be able to send and receive files.

Bluetooth

Now, assuming that there are no problems, let's see how to send a file from the device to the computer through Bluetooth.

Connect the Computer to a Device Using Bluetooth

Turn on the Bluetooth function on the device and make it discoverable so that your computer will find it. Then open up the Bluetooth device window either by double-clicking the Bluetooth icon from the system tray or notification area. Click on the 'Add device' button or simply search in the Start Menu's search box for bluetooth and select the 'Add a Bluetooth device' result.

Bluetooth

Next Windows 7 will search for Bluetooth enabled devices. When it finds your Bluetooth device, select it and click on Next.

Bluetooth

Then Windows 7 will show you a password or PIN that you have to type in the device. After you typed the PIN in your device, click on Next.

Bluetooth

Now you can see the newly added device in the Bluetooth Devices window. There you can also see if the device is working properly or if it requires troubleshooting.

How to Send a File via Bluetooth

In order to send a file either right-click the Bluetooth icon from the system tray/notification area and select the 'Send a file' option or search for bluetooth in the Start Menu's search box and click on 'Bluetooth File Transfer'. Then select the 'Send a file' action.

Bluetooth

Now select the device to which you want to send a file from the computer and click on Next. In the next window, click on Browse to select the file that you want to send and then click on Next.

Bluetooth

Tip: Hold down the Shift or Ctrl key to select multiple files.
You might need to allow the transfer on your device as well, and only then the computer will connect with it and it will send the file. In the next window you will see a summary of the files that were delivered to the device through the Bluetooth connection. Click on Finish to exit the window.

Bluetooth

If you want to send other files, repeat the same steps as above.

How to Receive a File via Bluetooth

In order to receive a file from the device to your computer, you can either right-click the Bluetooth icon from the system tray or notification area and select 'Receive a file' or search for bluetooth in the Start Menu's search box and click on 'Bluetooth File Transfer'. Then select the 'Receive a File' option.

Bluetooth

Windows 7 will wait until you select a file on your device. Select the file to be sent to the computer through the Bluetooth connection, wait until the device finds the computer, select it, and then your computer will receive the file. In the next window you will see the name and the size of the file and you have to possibility to choose where to save it. Click on Browse to choose a different location than the default one and then click on Finish.

Bluetooth

The file is now received and stored in the location you selected.

Conclusion

As you can see, sending or receiving files through a Bluetooth connection is quite easy, even if some problems can happen. The lucky part is that the troubleshooting wizards are definitely better at offering solutions then those from Windows Vista and, when using them, you will get some good solutions to your problems.

The wide range of devices that have support for Bluetooth can be a disadvantage because Microsoft can't collect and deliver driver support for every product that has Bluetooth capabilities. That's why every topic about Bluetooth connections between devices and computers is full of people complaining about problems with the connection, drivers or anything in between. If you have problems, solutions or you know some great tips and tricks about Bluetooth connections don't hesitate to share them with us in a comment.


 
Sharing the high Disk Space file between two computer is littel bit of difficult incase you don’t have high GB pen drive. Many use LAN Cable to connect the two computers but they can’t.

Here I bring you to How to connect two computers/Laptops using LAN Cable. so that you built your own network to share files, play counter strike, and much more…

Basic things required while building up a network are
LAN Cable with rj45 connectors
Computers/Netbook between the networking is to be done.

RJ45 is basically called as Register Jacket. It is a piece of plastic bound with different types of wires in a particular and sequential range for the purpose of running of different of different applications. This jack helps to enable you to ping with the other node.

We do networking by using TCP/IP ports. Each computer have its individual IP address. IP address are basically classified in 3 types A, B, C ranging from 1 to 225.

Class A – 0 to 127
Class B – 128 to 191
Class C – 192 to 223

Here are step which can help you to built a network at your home on your own.
  • The First and the basic step before setting up a network is to check whether LAN drivers are successfully installed on both the computers.
  • Insert the cable in connectors on both computers.
  • Go to Start>Control Panel>Network Connections>right click on Local Area Connection>properties>(TCP/IP)>properties.
  • Click on “use the following IP address“.
  • Remember you have to put IP addresses ranging from 1 to 254 only.
For instance you can put the following setting in first PC
IP address: 192.168.1.1
Subnet mask: 255.255.255.0 (appear default)
Default Gateway: Leave blank



Follow the same steps for the second PC but here you just have to change the IP address, for instance you can keep it 192.168.1.2 and other two kept same.




Save the settings for both the computers. To test whether both computers are connect we ping the each other IP. If you get a reply, then your network is setup successfully.

All are set, know enjoy sharing and gaming.

-Snehal-

Files with the extension ISO are a commonly used file type but I get a lot of inquiries from PC users who do not know what an ISO file is or what to do with one. If you are puzzled by ISO files, here’s what they are all about.

ISO files are simply a way of packaging a lot of files and folders together into a single file with the file extension ISO. They are generally used to create an image of a CD or DVD. Having just one file containing everything is convenient for downloading or for storing on a computer. It is becoming common to distribute programs this way instead of providing physical media. As fewer devices are coming with optical drives, you are likely to encounter ISO files more and more.

A major reason that many average PC users have trouble with ISO files is that Windows XP and Vista do not recognize them natively. If you try to open an ISO file in these older versions of Windows, they do not know what to do with it unless you have installed some third-party software to manage ISO files. However, Windows 7 does have a feature to burn ISO files to a CD or DVD.
Burning ISO files to a CD/DVD

One way to make use of ISO files is to burn the file to a physical CD or DVD disc using a process that extracts all the individual folders and files out of the ISO file and places them on the physical media. Windows 7 comes with the built-in Windows Disc Image Burner (not in earlier versions of Windows). Place a blank CD or DVD in your optical drive and double-click the ISO file. Once the disc is burnt, you can use the files and folders the usual way.

Many PCs also come with third-party software for burning discs. If one of these opens when you double-click an ISO file, choose “Burn disc image” or similar command.

There are also free programs for burning CDs or DVDs. 

Mounting an ISO file to emulate a disc

Often it is not necessary to actually burn a physical disc. It is becoming more common to use ISO files directly. Some older programs will only recognize an external disc and if that is the case you can mount the ISO file so that it appears to be on a separate drive.


Reading the contents of an ISO file without unpacking it


Some applications can read an ISO file as if it were a disc. For example, virtual machines can install Windows operating systems straight from the ISO without unpacking it. It is also possible to read contents of an ISO file with the archive program 7-Zip. It’s analogous to reading the contents of a ZIP file. 


Unpacking an ISO file directly to the hard drive or USB drive


It is also possible to use 7-Zip to extract all the files and folders from an ISO file and place them in a folder on the hard drive or on a USB drive. Just use 7-Zip in the same way as with regular archive files. There are also programs like IsoBuster. 

And there you have it – ISO files don't have to be a mystery any longer.


•    There are 10 types of people in the world: those who understand binary, and those who do not.

•    If at first you do not succeed, call it version 1.0

•    I am not anti-social; I am just not user friendly

•    My software never has bugs. It just develops random features

•    Roses are #FF0000, Violets are #0000FF, and my entire base belongs to you

•    In a world without fences and walls, who needs Gates and Windows?

•    Hand over the calculator, friends do not let friends derive drunk

•    I would love to change the world, but they will not give me the source code

•    Enter any 11-digit prime number to continue...

•    The box said 'Requires Windows 95 or better'. Therefore, I installed LINUX

•    A penny saved is 1.39 cents earned, if you consider income tax

•    UNIX, DOS and Windows...the good, the bad and the ugly

•    A computer lets you make more mistakes faster than any invention in human history - with the possible exceptions of handguns and tequila

•    The code that is the hardest to debug is the code that you know cannot possibly be wrong

•    UNIX is basically a simple operating system, but you have to be a genius to understand the simplicity

•    Ethernet (n): something used to catch the ether bunny

•    C://dos

•    C://dos.run

•    run.dos.run

•    You know it's love when you memorize her IP number to skip DNS overhead

•    JUST SHUT UP AND REBOOT!!

•    1f u c4n r34d th1s u r34lly n33d t0 g37 l41d

•    Alcohol & calculus don't mix. Never drink & derive

•    How do I set a laser printer to stun?

•    There is only one satisfying way to boot a computer

•    Concept: On the keyboard of life, always keep one finger on the escape button

•    It's not bogus, it's an IBM standard

•    Be nice to the nerds, for all you know they might be the next Bill Gates!

•    The farther south you go, the more dollar stores there are

•    Beware of programmers that carry screwdrivers

•    The difference between e-mail and regular mail is that computers handle e-mail, and computers never decide to come to work one day and shoot all the other computers

•    If you want a language that tries to lock up all the sharp objects and fire-making implements, use Pascal or Ada: the Nerf languages, harmless fun for children of all ages, and they won't mar the furniture

•    COFFEE.EXE Missing - Insert Cup and Press Any Key

•    Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots. So far, the Universe is winning

•    LISP = Lots of Irritating Silly Parentheses

•    The beginning of the programmer's wisdom is understanding the difference between getting program to run and having a runnable program

•    Squash one bug, you'll see ten new bugs popping

•    Everytime i time i touch my code, i give birth to ten new bugs

•    Boast = blogging is open & amiable sharing of thoughts

•    We are sorry, but the number you have dialed is imaginary. Please rotate your phone 90 degrees and try again

•    Cannot find REALITY.SYS. Universe halted

•    If it weren't for C, we'd all be programming in BASI and OBO

•    Bad command or file name! Go stand in the corner

•    Bad or corrupt header, go get a haircut

•    Unrecognized input, get out of the class

•    Warning! Buffer overflow, close the tumbler !

•    WinErr 547: LPT1 not found... Use backup... PENCIL & PAPER

•    Bad or missing mouse driver. Spank the cat? (Y/N)

•    Computers make very fast, very accurate mistakes

•    Best file compression around: "rm *.*" = 100% compression

•    Hackers in Hollywood movies are phenomenal. All they need to do is "c:\> hack into fbi"

•    BREAKFAST.COM Halted...Cereal Port Not Responding

•    I survived an NT installation

•    The name is Baud......James Baud

•    My new car runs at 56Kbps

•    Why doesn't DOS ever say "EXCELLENT command or filename!"

•    File not found. Should I fake it? (Y/N)

•    Cannot read data, leech the next boy's paper? (Y/N)

•    CONGRESS.SYS Corrupted: Re-boot Washington D.C (Y/n)?

•    Does fuzzy logic tickle?

•    Helpdesk : Sir, you need to add 10GB space to your HD , Customer : Could you please tell where I can download that?

•    Windows: Just another pane in the glass

•    Who's General Failure & why's he reading my disk?

•    RAM disk is not an installation procedure

•    Shell to DOS...Come in DOS, do you copy? Shell to DOS...

•    The truth is out there...anybody got the URL?

•    Smash forehead on keyboard to continue.....

•    E-mail returned to sender -- insufficient voltage

•    Help! I'm modeming... and I can't hang up!!!

•    Once I got this error on my Linux box: Error. Keyboard not attached. Press F1 to continue

•    Once I got this error on my Linux box: Error. Mouse not attached. Please left click the 'OK' button to continue

•    Press any key to continue or any other key to quit...

•    Press every key to continue

•    Helpdesk: Sir if you see the blue screen, press any key to continue. Customer : hm.. just a min.. where's that 'any key'..

•    Idiot, Go ahead, make my data!

•    Old programmers never die; they just give up their resources

•    To err is human - and to blame it on a computer is even more so

•    Logical Error CLINTON.SYS: Truth table missing

•    Clinton:/> READ | PARSE | WRITE | DUMP >> MONKIA.SYS

•    (D)inner not ready: (A)bort (R)etry (P)izza

•    Computers can never replace human stupidity

•    A typical Yahoo! inbox : Inbox(0), Junk(9855210)

•    (A)bort, (R)etry, (P)anic?

•    Bugs come in through open Windows

•    Penguins love cold, they wont survive the sun

•    Unix is user friendly...its just selective about who its friends are

•    Artificial intelligence usually beats real stupidity

•    Bell Labs Unix -- Reach out and grep someone.

•    To err is human...to really foul up requires the root password.

•    Invalid password : Please enter the correct password to (Abort / Retry / Ignore )

•    FUBAR - where Geeks go for a drink

•    I degaussed my girlfriend and I'm just not attracted to her anymore

•    Scandisk : Found 2 bad sectors. Please enter a new HD to continue scanning

•    Black holes are where God divided by zero

•    Hey! It compiles! Ship it!

•    Thank god, my baby just compiled

•    Yes! My code compiled, and my wife just produced the output

•    Windows 98 supports real multitasking - it can boot and crash simultaneously

•    Zap! And there was the blue screen !

•    Please send all spam to my main address, root@localhost :-)

•    MailerD(a)emon: You just received 9133547 spam. (O)pen all, (R)ead one by one, (C)heck for more spam

•    A: Can you teach me how to use a computer? B: No. I just fix the machines, I don't use them

•    PayPal: Your funds have been frozen for 668974 days

•    1-800-404 : The subscriber you are trying to call does not exist

•    1-800-403 : Access to that subscriber was denied

•    Error message: "Out of paper on drive D:"

•    If I wanted a warm fuzzy feeling, I'd antialias my graphics!

•    A printer consists of three main parts: the case, the jammed paper tray and the blinking red light

•    "Mr. Worf, scan that ship." "Aye Captain. 300 dpi?"

•    Smith & Wesson: The Original Point And Click Interface

•    Shout onto a newsgroup : It echoes back flames and spam

•    Firewall : Intruder detected. (A)llow in (D)eactivate the firewall

•    Real programmers can write assembly code in any language

•    Warning! Perl script detected! (K)ill it , (D)eactivate it

•    Firewall : Do you want to place a motion detector on port 80 ?

•    Helpdesk: Sir, please refill your ink catridges Customer : Where can i download that?

•    All computers run at the same speed... with the power off

•    You have successfully logged in, Now press any key to log out

•    Sorry, the password you tried is already being used by Dorthy, please try something else.

•    Sorry, that username already exists. (O)verwrite it (C)ancel

•    Please send all flames, trolls, and complaints to /dev/toilet

•    Shut up, or i'll flush you out

•    Cron : Enter cron command \ Now enter the number of minutes in an hour

•    We are experiencing system trouble -- do not adjust your terminal

•    You have successfully hacked in, Welcome to the FBI mainframes.

•    I'm sorry, our software is perfect. The problem must be you

•    Never underestimate the bandwidth of a station wagon full of tapes hurling down the highway

•    Webhost live help: Sir you ran out of bandwidth, User: Where can I download that?

•    If Ruby is not and Perl is the answer, you don't understand the question

•    Having soundcards is nice... having embedded sound in web pages is not

•    My computer was full, so I deleted everything on the right half

•    You have received a new mail which is 195537 hours old

•    Yahoo! Mail: Your email was sent successfully. The email will delivered in 4 days and 8 hours

•    I'm sorry for the double slash (Tim Berners-Lee in a Panel Discussion, WWW7, Brisbane, 1998)

•    Ah, young webmaster... java leads to shockwave. Shockwave leads to RealAudio. And RealAudio leads to suffering

•    What color do you want that database?

•    C++ is a write-only language. I can write programs in C++, but I can't read any of them

•    As of next week, passwords will be entered in Morse code

•    earth is 98% full ... please delete anyone you can

•    A typical yahoo chat room: "A has signed in, A has signed out, B has signed in, B has signed out, C has signed in, C has signed out.."

•    When someone says "I want a programming language in which I need only say what I wish done," give him a lollipop

•    Warning! No processor found! Press any key to continue

•    Failure is not an option. It comes bundled with your Microsoft product

•    NT is the only OS that has caused me to beat a piece of hardware to death with my bare hands

•    Warning! Kernel crashed, Run for your lives !

•    NASA uses Windows? Oh great. If Apollo 13 went off course today the manual would just tell them to open the airlock, flush the astronauts out, and re-install new one

•    JavaScript: An authorizing language designed to make Netscape crash

•    How's my programming? Call 1-800-DEV-NULL

•    Yes, friends and neighbors, boys and girls - my PC speaker crashed NT

•    root:> Sorry, you entered the wrong password, the correct password is 'a_49qwXk'

•    New Linux package released. Please install on /dev/null

•    Quake and uptime do not like each other

•    Unix...best if used before: Tue Jan 19 03:14:08 GMT 2038

•    As you well know, magic and weapons are prohibited inside the cafeteria -- Final Fantasy VIII

•    Man is the best computer we can put aboard a spacecraft...and the only one that can be mass produced with unskilled labo

•    Unix is the only virus with a command line interface

•    Windows 95 makes Unix look like an operating system

•    How are we supposed to hack your system if it's always down!

•    God is real, unless declared integer

•    I'm tempted to buy the slashdot staff a grammar checker. What do they do for 40 hours a week?

•    Paypal : Please enter your credit card number to continue

•    It takes a million monkeys at typewriters to write Shakespeare, but only a dozen monkeys at computers to run Network Solutions

•    Please help - firewall burnt down - lost packet - reward $$$

•    If Linux were a beer, it would be shipped in open barrels so that anybody could piss in it before delivery

•    Thank you Mario! But our princess is in another castle

•    Perl, the only language that looks the same before and after RSA encryption

•    Norton: Incoming virus - (D)ownload and save (R)un after download

•    I had a dream... and there were 1's and 0's everywhere, and I think I saw a 2!

As Geeks we are expected to have a certain set of skills that the majority of the population does not possess. This list is by no means complete, but I think it is a good sample of the skills required to be a true geek. I won’t pretend to have all the skills listed here. I even had to Google a few of them.

Like all good Geeks you should be able to utilize resources to accomplish any of these things. Knowing where to look for the knowledge is as good as having it so give yourself points if you are certain that you could Google the knowledge necessary for a skill.

  1. Properly secure a wireless router.
  2. Crack the WEP key on a wireless router.
  3. Leech Wifi from your neighbor.
  4. Screw with Wifi leeches.
  5. Setup and use a VPN.
  6. Work from home or a coffee shop as effectively as you do at the office.
  7. Wire your own home with Ethernet cable.
  8. Turn a web camera into security camera.
  9. Use your 3G phone as a Wi-Fi access point.
  10. Understand what “There’s no Place Like 127.0.0.1” means.
  11. Identify key-loggers.
  12. Properly connect a TV, Tivo, XBox, Wii, and Apple TV so they all work together with the one remote.
  13. Program a universal remote.
  14. Swap out the battery on your iPod/iPhone.
  15. Benchmark Your Computer
  16. Identify all computer components on sight.
  17. Know which parts to order from NewEgg.com, and how to assemble them into a working PC.
  18. Troubleshoot any computer/gadget problem, over the phone.
  19. Use any piece of technology intuitively, without instruction or prior knowledge.
  20. How to irrecoverably protect data.
  21. Recover data from a dead hard drive.
  22. Share a printer between a Mac and a PC on a network.
  23. Install a Linux distribution. (Hint: Ubuntu 9.04 is easier than installing Windows)
  24. Remove a virus from a computer.
  25. Dual (or more) boot a computer.
  26. Boot a computer off a thumb drive.
  27. Boot a computer off a network drive.
  28. Replace or repair a laptop keyboard.
  29. Run more than two monitors on a single computer.
  30. Successfully disassemble and reassemble a laptop.
  31. Know at least 10 software easter eggs off the top of your head.
  32. Bypass a computer password on all major operating systems. Windows, Mac, Linux
  33. Carrying a computer cleaning arsenal on your USB drive.
  34. Bypass content filters on public computers.
  35. Protect your privacy when using a public computer.
  36. Surf the web anonymously from home.
  37. Buy a domain, configure bind, apache, MySQL, php, and Wordpress without Googling a how-to.
  38. Basic *nix command shell knowledge with the ability to edit and save a file with vi.
  39. Create a web site using vi.
  40. Transcode a DVD to play on a portable device.
  41. Hide a file in an image using steganography.
  42. Knowing the answer to life, the universe and everything.
  43. Share a single keyboard and mouse between multiple computers without a KVM switch.
  44. Google obscure facts in under 3 searches. Bonus point if you can use I Feel Lucky.
  45. Build amazing structures with LEGO and invent a compelling back story for the creation.
  46. Understand that it is LEGO, not Lego, Legos, or Lego’s.
  47. Build a two story house out of LEGO, in monochrome, with a balcony.
  48. Construct a costume for you or your kid out of scraps, duct tape, paper mâché, and imagination.
  49. Be able to pick a lock.
  50. Determine the combination of a Master combination padlock in under 10 minutes.
  51. Assemble IKEA furniture without looking at the instructions. Bonus point if you don’t have to backtrack.
  52. Use a digital SLR in full manual mode.
  53. Do cool things to Altoids tins.
  54. Be able to construct paper craft versions of space ships.
  55. Origami! Bonus point for duct tape origami. (Ductigami)
  56. Fix anything with duct tape, chewing gum and wire.
  57. Knowing how to avoid being eaten by a grue.
  58. Know what a grue is.
  59. Understand where XYZZY came from, and have used it.
  60. Play any SNES game on your computer through an emulator.
  61. Burn the rope.
  62. Know the Konami code, and where to use it.
  63. Whistle, hum, or play on an iPhone, the Cantina song.
  64. Learning to play the theme songs to the kids favorite TV shows.
  65. Solve a Rubik’s Cube.
  66. Calculate THAC0.
  67. Know the difference between skills and traits.
  68. Explain special relativity in terms an eight-year-old can grasp.
  69. Recite pi to 10 places or more.
  70. Be able to calculate tip and split the check, all in your head.
  71. Explain that the colours in a rainbow are roygbiv.
  72. Understand the electromagnetic spectrum – xray, uv, visible, infrared, microwave, radio.
  73. Know the difference between radiation and radioactive contamination.
  74. Understand basic electronics components like resistors, capacitors, inductors and transistors.
  75. Solder a circuit while bottle feeding an infant. (lead free solder please.)
  76. The meaning of technical acronyms.
  77. The coffee dash, blindfolded (or blurry eyed). Coffee [cream] [sugar]. In under a minute.
  78. Build a fighting robot.
  79. Program a fighting robot.
  80. Build a failsafe into a fighting robot so it doesn’t kill you.
  81. Be able to trace the Fellowship’s journey on a map of Middle Earth.
  82. Know all the names of the Dwarves in The Hobbit.
  83. Understand the difference between a comic book and a graphic novel.
  84. Know where your towel is and why it is important.
  85. Re-enact the parrot sketch.
  86. Know the words to The Lumberjack Song.
  87. Reciting key scenes from Monty Python and the Holy Grail.
  88. Be able to recite at least one Geek Movie word for word.
  89. Know what the 8th Chevron does on a Stargate and how much power is required to get a lock.
  90. Be able to explain why it’s important that Han shot first.
  91. Know why it is just wrong for Luke and Leia to kiss.
  92. Stop talking Star Wars long enough to get laid.
  93. The ability to name actors, characters and plotlines from the majority of sci-fi movies produced since 1968.
  94. Cite Mythbusters when debunking a myth or urban legend.
  95. Sleep with a Cricket bat next to your bed.
  96. Have a documented plan on what to do during a zombie or robot uprising.
  97. Identify evil alternate universe versions of friends, family, co-workers or self.
  98. Be able to convince TSA that the electronic parts you are carrying are really not a threat to passengers.
  99. Talk about things that aren’t tech related.
  100. Get something on the front page of Digg.


Some of you may be wondering why you would ever need a bootable pen drive or some of you may even don't get what exactly this post is all about. For those who do not understand what does the word 'boot' mean - "It's a process your computer follows every time it is turned on or restarted. The process is basically looking for the operating system in the memory" and when we say 'bootable' pen drive, it means your computer starts looking for the operating system (Windows in our case) in your pen drive.

Now for all those desperate and frustrated fellows who want to install Windows 7 in their system but aren't able to do so because of the hardware limitations (or any other reason), here's the procedure:

This is the tutorial for installing Windows 7 using a bootable pen drive but I believe you can install any Operating system in your computer using this procedure:

Pre-requisites:

1. A pen drive (4 GB minimum)
2. Windows 7 .ISO file (which you can make using any CD/DVD image creating software like MagicISO)
3. WinUSB maker Software (to make your pen drive bootable)
4. A computer with USB ports (does that sound obvious?)

Steps to follow:

1. Download WinUSB maker Software from here.
2. Extract the package files and run the application.
3. Connect your pen drive to the computer.
4. Now select your USB device (pen drive) using the drop down.



5. Now click on Setup to USB and select an ISO file to work with.






6. Now click on Make USB Bootable.




Here you go. Now it will format your device and will make it bootable with the .ISO image of Windows 7. You can check the file transfer status in the bar and once it is completed, you can remove the pen drive from the computer.




7. Now you need to follow a small step with the BIOS of your computer. You can enter BIOS of your computer by hitting F11 or Delete key (the keys vary from system to system. Look on the screen for exact key) on the very first screen which appears for few seconds as soon as you turn on/restart your computer.

8. Now you need to enter the Boot Menu of your BIOS and set your USB device as the first boot device in the list (use +, - keys to do this).




9. After saving the settings, exit BIOS.

10. Now connect your pen drive to your computer and restart it. As soon as you restart your computer, it will boot from the USB (pen drive) and will install Windows 7 in your computer (you will need to follow simple steps of Windows installation).

Ever get stressed out because you know that there would be subnetting question(s) in the next exam you are taking and that these questions easily take up 10 to 20 minutes of your precious exam time? What if there is more than one question?

The process of converting the subnet to binary and decimal can drive the unfamiliar insane, not to mention the waste of precious time and brain power which can be utilized for other areas of exam preparation.

Let's take a look at a shortcut method that will cut down the time needed to answer these questions without the need for a calculator.

Subnet Basics:

This article assumes that you know how to perform subnetting in the traditional method but it is important to stress that there are only 3 classes of usable IP addresses which are:


Class
Range
Subnet mask
Host bit
Subnet
Class A
1 - 126
(127 is reserved for loopback)
255.0.0.0
24
8
Class B
128 - 191
255.255.0.0
16
16
Class C
192 - 223
255.255.255.0
8
24

You must understand and remember this table well in order to master the shortcut.

Note: You must borrow at least 2 bits and must leave at least 2 bits.

The Subnet Table:

Bits Borrowed (N)
1
2
3
4
5
6
7
8
Bit Value
128
64
32
16
8
4
2
1
Subnet Mask
128
192
224
240
248
252
254
255
Number of Subnets ((2^N)-2)
0
2
6
14
30
62
126
254

Stop: Before continuing, please read this very important article regarding the use of the ((2^N)-2) method of subnetting.

If using the (2^N) method as defined in RFC 1878, your table would look like this instead.

Bits Borrowed (N)
1
2
3
4
5
6
7
8
Bit Value
128
64
32
16
8
4
2
1
Subnet Mask
128
192
224
240
248
252
254
255
Number of Subnets
(2^N)
2
4
8
16
32
64
128
256

The subnet table is commonly seen in lecture notes or certification guides but what the author/lecturer did not tell you is how to derive this table on the fly. Its actually quite simple, lets look at it line by line.

  1. Bits borrowed, this is the easy one, just remember that the table consists of only 8 columns.
  2. Bits Value, remember by heart that the first value starts with 128 and the subsequent values are divided by two.
  3. Subnet Mask, this line tells you what the subnet mask would be, to get the figures, add up the corresponding bits value and all of the values prior to it.
  4. 128 + 0 (there is no prior value) =128 128 + 64 = 192 192 + 32 = 224 224 + 16 = 240 240 + 8 = 248 248 + 4 = 252 252 + 2 + 254 254 + 1 + 255
  5. Number of Subnets, tells you how many subnet you'll get if you use the subnet mask. Just look at the corresponding N value at the top and you can derive the figures.
Once you understand how to derive the subnet table, spend some time practicing. I would advise you to draw out the table once you are in the exam room (before starting the actual exam) it will take you less than a minute.

How to Tackle the Questions:

There are only a few different ways that Microsoft or Cisco can phrase their questions, lets take a look at some examples:

Question Type 1:
If you are to determine the subnet mask based on a number of hosts and an IP address...

Example:
You are assigned an IP address of 172.30.0.0 and you need 1000 hosts on your network, what is your subnet mask.
  1. Determine the number of bits needed for the hosts. In this scenario, we need ten bits as 2^10 = 1024 (the question asks for 1000 hosts only).
  2. Determine the number of bits left for the subnet. 32 - (number of bits needed for the host) which is 32-10 = 22 bits.
  3. Determine the number of bits actually borrowed. We take the number of bits left for the subnet and minus as many 8s as possible as each 8 represents 1 octal. Therefore 22 - 8 - 8 = 6 bits were borrowed.
Bits Borrowed (N)
1
2
3
4
5
6
7
8
Bits Value
128
64
32
16
8
4
2
1
Subnet Mask
128
192
224
240
248
252
254
255
Number of Subnets
(2N-2)
0
2
6
14
30
62
126
254

With reference to the subnet table, 6 bits would have a subnet of 255.255.252.0 . Take note that a total of two 8s were subtracted off, therefore the first two octal would be 255.255.x.x and the 3rd octal was 6 bits borrowed which leaves with 255.255.252.x.

Question Type 2:
If you were given an IP address of 172.30.0.0 and you need 15 subnets...

Bits Borrowed (N)
1
2
3
4
5
6
7
8
Bits Value
128
64
32
16
8
4
2
1
Subnet Mask
128
192
224
240
248
252
254
255
Number of Subnets
(2N-2)
0
2
6
14
30
62
126
254

With reference to the subnet table, the subnet mask should be 255.255.248.0. 172.30.0.0 is a Class B address and the subnet should be 255.255.0.0.

Question Type 3:
You are assigned an IP address of 172.30.0.0 and you need 55 subnets, how many hosts do you have per subnet?
  1. Determine the number of bits used for the subnet.

    Bits Borrowed (N)
    1
    2
    3
    4
    5
    6
    7
    8
    Bits Value
    128
    64
    32
    16
    8
    4
    2
    1
    Subnet Mask
    128
    192
    224
    240
    248
    252
    254
    255
    Number of Subnets
    (2N-2)
    0
    2
    6
    14
    30
    62
    126
    254

    According to the chart, the closest match to 55 subnet would be 62 and therefore, the number of bits borrowed for the subnet is 6. Since 172.30.0.0 is a Class B, we would need to add another 16 bits to the 6 making it 22 bits in total.
  2. Determine the number of bits used for the host. Number of bits used for the hosts is 32 - (number of bits used for the subnet) which is 22 = 10 bits. 2^10-2 = 1022, therefore there are a total of 1022 usable hosts in each subnet.
The key to mastering this shortcut is the same as with any other mathematical question - pratice.

Good luck on your next exam.

-Snehal-

The applications and games that you find on the best iPod Touch apps list are not just restricted to the Apple iPod Touch. They can be used on the Apple iPhone as well, and most of them can even be used on the Apple iPad. The quantity and the quality of these apps is one of the most attractive points of owning a device developed by Apple Inc, and you can rest assured that you will get productive and useful apps in every category that you look.


There are more than 300,000 apps available in the Apple App Store, and they optimize the use and the features of your iPod Touch. The new Apple iPod Touch 4G has raised the bar even higher for portable MP3 players, and now you can access the Internet with it, make video calls with it, watch videos on it and the various apps are simply tools that are meant to make all these tasks more enjoyable and productive at the same time.


Apple iPod Touch Apps List


With that information in mind, here are some of the top iPod Touch apps that you make use of today, divided into the various categories in the Store.

Category Top Free App Name Top Paid App Name
Books
  • iBooks
  • B&N Bookstore
  • Marvel Comics
  • B&N Nook
  • Stanza
  • MegaReader
  • Pocket God Comics
  • Dr. Seuss's ABC
  • Audiobooks
  • Ebook Reader
Business
  • Dragon Dictation
  • Monster.com Jobs
  • Office
  • CamCard
  • Genius Scan
  • PDF Reader Pro
  • Documents To Go
  • Currency Converter
  • Job Search
  • FedEx Mobile
Entertainment
  • Netflix
  • Star Wars: Light Saber Duel
  • Aging Booth
  • Gun Builder
  • Talking Honey Cat
  • Pocket God
  • Remote
  • iBeer
  • AVPlayer
  • Wallpaper Factory HQ
Games
  • Angry Birds
  • City Zombies
  • Dinosaur Slayer
  • Original Gangstaz
  • Lyric Legend
  • Rage HD
  • Uno
  • Solitaire
  • LEGO Harry Potter
  • Guitar Hero
Music
  • Pandora Radio
  • Shazam
  • SoundHound
  • SongCatcher
  • VEVO
  • Ocarina
  • LaDiDa
  • PocketGuitar
  • Drum Kit Pro
  • GuitarToolkit
Utilities
  • Spy Cams
  • Mirror in Your Pocket
  • Free Wi-Fi Finder
  • Battery Life Pro
  • Alarm Clock
  • Barcode Scanner
  • Flashlight
  • iDownloader
  • Mobile Mouse Pro
  • Cloud Browse
Travel
  • Google Earth
  • Yelp
  • Urbanspoon
  • American Airlines
  • OpenTable
  • Kayak
  • FlightBoard
  • Zagat To Go
  • New York Subway
  • Disney World Dining
Sports
  • ESPN ScoreCenter
  • NFL.com
  • College Football Live
  • CBS Sports Mobile
  • Paper Football 3D
  • ESPN Radio
  • ACC Sports
  • Hunting Call
  • Pele
  • MMA Underground
Productivity
  • Google Voice
  • Evernote
  • Shopping List Free
  • iTranslate
  • CamScanner Free
  • Atomic Web Browser
  • Santa's Bag
  • Keynote Remote
  • LogMeIn Ignition
  • Quickoffice Mobile Suite
Health & Fitness
  • Calorie Counter and Diet Tracker
  • WebMD Mobile
  • Period Tracker Lite
  • Fooducate
  • iMapMyRun
  • Nike+ GPS
  • iFitness
  • Sleep Machine
  • All-in YOGA
  • BabyBump Pregnancy Pro

You can also find many free iPod Touch apps lists online to get more information on the best iPod Touch apps 2010 that you can get for free. In addition to these categories, there are many more present in the App Store as well, and one can truly spend hours browsing through the various available apps. The paid apps obviously, provide more features and benefits than the free ones, and this is not lost on consumers. Many people prefer to pay for some apps, so as to enjoy their leading characteristics and features.

The top iPod Touch apps know how to make full use of the impressive hardware of the device. The 1 GHz processor and the 3.5 inches Retina-Eye Display combine together to give the user an enriched experience, and this is enhanced by the way certain iPod applications look on the display screen. Video games are becoming more and more popular on the iPod Touch, and the device is fast overtaking the Sony PSP and the Nintendo DS as the most popular handheld gaming device in the world.

With the help of this iPod Touch apps list you can find the best iPod Touch apps ever for your iPod Touch, and you can enjoy it to its extreme. A lot of money and resources are spent by the developers of these apps to give the best results, and each and every single one of them will be useful to you sooner or later.


Is your computer infected by virus named -SAM - ? Are you not able to surf your favorite websites like orkut or proxy sites ? Irritated due to activities of that virus? Here is the solution !!


One thing I want make clear is that, This is not a “Computer virus”. (You may check the definition of that word on the net) Then what exactly is it ?

It is actually a computer program designed to block the website not expected in colleges, companies or any other official places. This -SAM- program will only block pornographic sites, harmful sites and sites like orkut, my space n so on.

What can be assured is it will not harm your computer in any way, also its not having any kind of destructive purpose. Instead if -SAM- is running, rest of the viruses cant exist in the same computer, yes this is one of the best features of -SAM- program.

-SAM- was actually a module of our project “System Maintenance Suite” - one of the top 8 softwares awarded in India in IIT TechFest !

-SAM- was spread by mistake while experimenting on college PCs, want to say that it was not spread desperately. Still if you don’t like that you may run the removal of -SAM- provided above.