Sunday, December 09, 2012

Jab Tak Hai Jaan

Released : Nov 13, 2012
Genre : Drama, Romance
Starcast : Shahrukh Khan, Katrina Kaif, Anushka Sharma
Desc :
A Yash Chopra romance starring Shahrukh Khan, Katrina Kaif and Anushka Sharma. The film has brought together the award-winning pair of A. R. Rahman and Gulzar who

Talaash

Released : Nov 30, 2012
Genre : Crime, Drama, Thriller
Starcast : Aamir Khan, Kareena Kapoor, Rani Mukherjee, Shernaz Patel, Rajkumar Yadav
Desc :
Seeing reflections of Mumbai under the red light, `Talaash` is a tale of love lost, fatal attraction and above all the quest to solve a perfect crime. Suspense at its core, `Talaash` explores Mumbai`s underbelly like never before. Aamir Khan plays an investigation officer, Inspector Shekhawat who receives a phone call early in the morning, informing him about death and an accident and how everything starts to unfold from there. The case turns into a life altering chase for Inspector Shekhawat when he is

Khiladi 786

Released : Dec 7, 2012
Genre : Action, Comedy
Starcast : Akshay Kumar, Himesh Reshammiya, Asin Thottumkal , Mithun Chakraborty
Desc :
Born to an owner of a marriage bureau, Champak Lal Mansukh has been a complete failure ever since he grew up and tried to help his father in their family business. All the alliances he tried to get didn`t even culminate in marriage. To prove his worth to his father, he takes up the unusual challenge of getting an underworld don TT bhai`s spoilt

Friday, October 19, 2012

SHOTTO - WARFAZE FREE DOWNLOAD



JUDDHO by LETS ROCK BANGLADESH (LRB)

Juddho 2012 Album Info: Album: Juddho 2012 Band / Artist: LRB Banner : DLM Format: MP3 MP3 Bit Rate: 320Lbps VBR Download Direct Link of Juddho 2012 MP3 Songs. 01. Juddho.mp3 Links: ZippyShare / Mirrors Links 02. Ekti Chele.mp3 Links: ZippyShare / Mirrors Links 03. Ondhokar.mp3 Links: ZippyShare / Mirrors Links 04. Shap Ludu.mp3 Links: ZippyShare / Mirrors Links 05. Agun Niye.mp3 Links: ZippyShare / Mirrors Links 06. Je Chole Jay.mp3 Links: ZippyShare / Mirrors Links 07. Abar Juddhe Jabo.mp3 Links: ZippyShare / Mirrors Links 08. Ondho.mp3 Links: ZippyShare / Mirrors Links 09. Purotai Faki.mp3 Links: ZippyShare / Mirrors Links 10. Bhoy.mp3 Links: ZippyShare / Mirrors Links Zip File: All Songs In Single Link Download Links: ZippyShare / Mirrors Links

Read more at Songs44.Com: Juddho 2012 – LRB MP3 Songs Free Download http://songs44.com/juddho-2012-lrb-mp3-songs-free-download/
01. Juddho.mp3 Links: ZippyShare / Mirrors Links

Read more at Songs44.Com: Juddho 2012 – LRB MP3 Songs Free Download http://songs44.com/juddho-2012-lrb-mp3-songs-free-download/

The Expendables 2

Released : 2012
Genre : Action | Adventure
Starcast : Sylvester Stallone, Liam Hemsworth and Randy Couture and many more..
Desc :
The Expendables are reunited when Mr. Church enlists them to take on a seemingly simple job. When things go wrong, the Expendables are compelled to seek revenge in hostile territory, where the odds are stacked against them. Hell-bent on payback, the crew cuts a swath of destruction through opposing forces, wreaking 

Makkhi DVD

Released : Oct 12, 2012
Genre : Action, Adventure, Fantasy
Starcast : Nani, Samantha , Sudeep
Desc :
Makkhi is the Hindi dubbed version of the Telugu superhit Eega. It is the story of Jani and Bindu who are in love, but they never communicated their feelings to each other and continue to enjoy their unexpressed love. Sudeep, a billionaire and a powerful businessman gets attracted to Bindu and wants to own her for his pleasure, but he realizes that she is in love with

Kamaal Dhamaal Malamaal DVDScr


Released : Sep 28, 2012
Genre : Comedy
Starcast : Nana Patekar, Shreyas Talpade, Paresh Rawal, Rajpal Yadav, Om Puri
Desc :
Bakri Johnny!! That`s the insinuating cry of every man, woman and child in this village when they see (Shreyas). Afraid of everything and everyone, Johnny is one terrified soul. Born into the household of David (Om Puri), a local farmer and being the only

Saturday, June 23, 2012

Dukkho Koro Na, Bacho-Mrittika






Dukkho Koro Na, Bacho-Mrittika Bangla Band Mp3 [128kpbs & 320Kpbs] Song Album, Download Bangla Songs Of Dukkho Koro Na, Bacho-Mrittika Free MP3 Songs Download, MP3 Songs Of Dukkho Koro Na, Bacho-Mrittika, Download Songs, Album, Music Download, Band Songs Dukkho Koro Na, Bacho-Mrittika
128Kpbs Song List & Download Link:
  • 01.Bangladesh
  • Direct Download Link
  • Mediafire Download Link
  • 02.Ghumonto Sohor
  • Direct Download Link
  • Mediafire Download Link
  • 03.Ei Sobuj
  • Direct Download Link
  • Mediafire Download Link
  • 04.Che Guevra
  • Direct Download Link
  • Mediafire Download Link
  • 05.Kokhono Jante Cheyo Na
  • Shuttle Train-Touhid Shimul





    Shuttle Train-Touhid Shimul Bangla Band Mp3 [128kpbs & 320Kpbs] Song Album, Download Bangla Songs Of Shuttle Train-Touhid Shimul Free MP3 Songs Download, MP3 Songs Of Shuttle Train-Touhid Shimul, Download Songs, Album, Music Download, Band Songs Shuttle Train-Touhid Shimul
    128Kpbs Song List & Download Link:
  • 01.Pori
  • Direct Download Link
  • Mediafire Download Link
  • 02.Khujchi Tomay
  • Direct Download Link
  • Mediafire Download Link
  • 03.Shuttle Train
  • Direct Download Link
  • Mediafire Download Link
  • 04.Phire Esho
  • Direct Download Link
  • Mediafire Download Link
  • 05.Smritir Album
  • Artcell Lyrics Collection (আর্টসেল লিরিক কালেকশন)

    Chile Kothar Sepai(চিলে কোঠার সেপাই)

    কথাঃ রুম্মান আহমেদ
    কন্ঠঃ লিংকন
    ব্যান্ডঃ আর্টসেল
    অ্যালবামঃ আগন্তুক-২
    যা দেখ যা দেখ না
    ভাঙে যত অনুভুতি চেনা অচেনা
    তোমার অনাগত সম্ভাবনায়
    জমে ঘুণ পোকার আর্তনাদ
    তোমার নীল আকাশ শূন্য চোখে
    চেয়ে থাকে অন্ধকার দেয়ালে
    তোমার আলো জন্ম দেয়

    avast! version 7 (FREE)

    S
    Engine: Blocks viruses & spyware

    The Avengers

    MOVIE INFO

    Released : Apr 27, 2012
    Genre : Action , Adventure, Sci-Fi
    Starcast : Robert Downey Jr.. Chris Evans, Mark Ruffalo, Chris Hemsworth, Scarlett Johansson
    Desc :
    Marvel Studios presents Marvel’s The Avengers-the Super Hero team up of a lifetime, featuring iconic Marvel Super Heroes Iron Man, The Incredible Hulk, Thor, Captain America, Hawkeye and Black Widow. When an unexpected enemy emerges that threatens global 

    Ghost Rider Spirit of Vengeance


     


    MOVIE INFO

    Released : 2012
    Genre : Action | Fantasy | Thriller
    Starcast : Nicolas Cage, Ciarán Hinds and Idris Elba
    Desc :
    Former stuntman and bounty hunter of rogue demons Johnny Blaze has been living in self-imposed exile, believing that his powers are a curse. But when he is approached by a member of a monastic order who is looking for someone to protect a mother and her son, 

    Monday, June 18, 2012

    To disable unneeded startup services for a safer, faster XP, use the "Services" Admin Tool..
    (Control Panel > Administrative Tools > Services) . If you are a single user of a non-networked machine, you can disable the following items, with no ill effect.
    Alerter
    Clipbook
    Computer Browser
    Fast User Switching
    Human Interface Access Devices
    Indexing Service (Slows the hard drive down)
    Messenger
    Net Logon (unnecessary unless networked on a Domain)
    Netmeeting Remote Desktop Sharing (disabled for extra security)
    Remote Desktop Help Session Manager (disabled for extra security)
    Remote Procedure Call Locator
    Remote Registry (disabled for extra security)
    Routing & Remote Access (disabled for extra security)
    Server
    SSDP Discovery Service (this is for the utterly pointless "Universal P'n'P", & leaves TCP Port 5000 wide open)
    TCP/IP NetBIOS Helper
    Telnet (disabled for extra security)
    Universal Plug and Play Device Host
    Upload Manager
    Windows Time
    Wireless Zero Configuration (for wireless networks)
    Workstation
    Go to ontrol Panel > System, > Advanced > Performance area > Settings button Visual Effects tab "Use drop shadows for icon labels on the Desktop"....
    By making a few judicious changes using the security tools within Windows Vista--and in some cases by adding a few pieces of free software--you can lock down your operating system.
    1. Use Windows Security Center as a Starting Point
    For a quick overview of your security settings, the Windows Security Center is where you'll find the status of your system firewall, auto update, malware protection, and other security settings. Click Start, Control Panel, Security Center, or you can simply click the shield icon in the task tray. If you see any red or yellow, you are not fully protected. For example, if you have not yet installed an antivirus product on your machine, or if your current antivirus product is out-of-date, the Malware section of the Security Center should be yellow. Windows does not offer a built-in antivirus utility, so you'll want to install your own. For free antivirus, I recommend AVG Anti-Virus 8.
    2. Use Windows Defender as a Diagnostic Tool
    The Malware section also covers antispyware protection, and for that Windows Vista includesWindows Defender. The antispyware protection in your antivirus program usually trumps the protection Microsoft provides, but there are several good reasons to keep Windows Defender enabled. One is that every antispywareprogram uses a different definition of what is and what is not spyware, so redundant protection can actually offer some benefit.
    Another reason to keep Windows Defender enabled: diagnostics. Click Tools, and choose Software Explorer from the resulting pane. Youcan display lists of applications from several categories such as Currently Running Programs, Network Connected Programs, and Winsock Service Providers, but Startup Programs is perhaps the most useful. Click on any name in the left window, and full details willappear in the right pane. By highlighting, you can remove, disable, or enable any of the programs listed.
    3. Disable the Start Up menu
    Windows Vista keeps track of all the documentsand programs you launch in the Start Up menu. This can be convenient for some users, but it can also compromise your privacy if you share a computer within an office or household. Fortunately Windows Vista provides an easy way to tweak this setting. To protect your privacy, follow these steps:
    Right click on the taskbar and select Properties.
    Click on the Start Menu tab.
    Uncheck Store and display a list of recently opened files.
    Uncheck Store and display a list of recently opened programs.
    Click OK.
    4. Get Two-Way Firewall Protection
    No desktop should be without a personal firewall, but even if the Security Center says you're protected, you may not be. The Windows Firewall within Vista blocks all incoming traffic that might be malicious or suspicious--and that's good. But outbound protection is not enabled by default. That's a dangerous situationif some new malicious software finds its way onto your PC. Microsoft did include the tools for Windows Vista to have a true two-way firewall, but finding the setting is a little complicated. (Hint: Don't go looking the Windows Firewall settings dialog box.)
    To get two-way protection in Windows Vista, click on the Start button; in the search space, type wf.msc and press Enter. Click on the Windows Firewall with Advanced Security icon. This management interface displays the inbound and outbound rules. Click on Windows Firewalls Properties. You should now see a dialog box with several tabs. For each profile--Domain, Private, and Public--change the setting to Block, and then click OK.
    5. Lock Out Unwanted Guests
    If you share your computer with others (and even if you don't), Windows Vista includes a neat way to keep unwanted guests from guessing your system administrator password. When you set up users and declare one user as administrator (with full privileges), Windows Vista allows outsiders unlimited guesses at the password you chose. Here's how to limit the guesses.
    Click Start, type Local Security Policy.
    Click Account Lockout Policy.
    Choose Account Lockout Threshold.
    At the prompt, enter the number of invalid log-ins you'll accept (say, 3).
    Click OK and close.
    6. Now Audit Your Attackers
    With the Account Lockout policy in place, you can now enable auditing to see any account attacks. To turn on auditing for failed log-on events, do the following:
    Click the Start button, type secpol.msc, and click the secpol icon.
    Click on Local Policies and then Audit Policy.
    Right-click on Audit account logon events policy and select Properties.
    Check the Failure box and click OK.
    Right-click on Audit logon events policy and select Properties.
    Check the Failure box and click OK.
    Close the Local Security Policy window.
    You can then use the Event Viewer (by running eventvwr.msc) to view the logs under Windows Logs and Security.
    7. Secure Your Internet Explorer Settings
    The Windows Security Center will also report whether your Internet Explorer 7 (or IE security settings are at their recommended levels. If the screen shows this section as red, you can adjust the settings within the browser itself.
    Within Internet Explorer, click Tools in the menu bar.
    From the drop-down menu, click Internet Options.
    Choose the Security tab.
    Within the Security tab, click Custom Level.
    Here you'll see a window with all the security options for the browser. If any are below the recommended level (if, say, some kind of malware reconfigured your browser settings), these options will be highlighted in red. To change an individual setting, click the appropriate radio button. To reset them all, usethe button near the bottom of the tab. You can also change the overall security setting for Internet Explorer from the default Medium-Highsetting to the recommended High or Medium, ifyou wish. Click OK to save and close.
    8. Use OpenDNS
    Domain Name System (DNS) servers act as a phone book. When you type "pcworld . com" in the address bar, for instance, Internet Explorer sends that common-name request to your Internet service provider's DNS servers to be converted into a series of numbers, or an IP address. Lately, DNS servers have come under attack, with criminals seeking to redirect common DNS preferences to servers that their interests control. One way to stop such abuse isto use OpenDNS.
    Go to Start, Control Panel, Network and Internet, and then click Network and Sharing Center. Under the tasks listed on the left, click Manage Network Connections. In the Manage Network Connections window, do the following.
    Right-click on the icon representing your network card.
    Click Properties.
    Click Internet Protocol Version 4.
    Click the Properties button.
    Select the Use the following DNS server addresses radio button.
    Click OK.
    9. Live With User Account Control
    One area where some people might want to see the Windows Security Center turn red is User Account Control (UAC), perhaps the most controversial security feature within Windows Vista. Designed to keep rogue remote software from automatically installing (among other things), UAC has a tendency to thwart legitimate software installations by interruptingthe process several times with useless messages. In Windows 7 you'll be able to set UAC to the level you want. Until then, you do have some options.
    One is to disable UAC. I would caution against that, since UAC is meant to warn you of potential danger. Instead, install TweakUAC, a free utility that offers the ability to turn UAC onor off as well as an intermediate "quiet" mode that keeps UAC on but suppresses administration elevation prompts. With TweakUAC in quiet mode, UAC will appear to beoff to those running as administrator accounts, while people with standard user accounts will still be prompted.
    10. Check Your Work
    Now that you've tweaked Windows Vista, you can keep tabs on your system's security with the System Health Report. This diagnostic tool takes input from the Performance and Reliability Monitor and turns it into an information-packed report that can spotlight potential security problems.
    Open Control Panel.
    Click System.
    In the Tasks list, click Performance (near the bottom).
    In the resulting Tasks list, click Advanced tools(near the top).
    Click the last item on the resulting list: Generate a system health report.
    The report will list any missing drivers that might be causing error codes, tell you whether your antivirus protection is installed, and declare whether UAC is turned on. You may want to run this report once a month just to make sure everything's still good.
    In a narrow sense, spyware is a term for some tracking technologies (specifically, executable applications) deployed on your computer without adequate notice, consent, or control. Spyware can monitor your activities online and/or perform functions without your knowledge or consent. Depending on the program, spyware can track and report on every Web site you visit, generate pop-up advertising, change your home page and browser settings, or record every key you press.
    In its broader sense, spyware is also commonly used as the overall name for most types of potentially unwanted technologies detected by popular anti-spyware programs.
    These technologies are implemented in ways that impair your control over the following: collection, use, and distribution of your personal information; material changes that affect your desktop experience, privacy, or system security; and use of your system resources. These are items that users of anti-spyware software will want to be informed about and that they may want to easily remove or disable.
    Adware is a subset of the broader spyware category, which is designed to
    deliver targeted advertising to your Web browser, especially through the use of pop-up ads. Adware is often bundled with other software programs, such as peerto- peer file-sharing software, games, or other utilities that can be downloaded for free from the Web. Adware knows what kinds of ads to deliver to you because it tracks the places you surf. For instance, if you surf to a car rental site, an adware program might generate a pop-up ad that a competing car rental company has paid the adware company to deliver to you. Besides tracking your behavior and annoying you with ads, adware may also open a connection on the Internet to report your surfing habits back to a central server. This information, which may
    include your age, your sex, your shopping habits, and even your location, is used to conduct ?market research? to attract new clients.
    Trojan horses are programs that claim to be something they are not. For
    instance, a Trojan horse may advertise itself as an amusing animation clip, a screen saver, or a free software program that promises to do something cool or helpful. But Trojan horses also include unadvertised functions (if, in fact, the advertised function works at all). The most common goal of a Trojan horse is to install a back door on your computer or steal passwords. A back door lets attackers control your machine remotely. Some classes of spyware can be considered Trojan horses because they arrive under false pretenses. For instance, you may have downloaded a neat little screen saver with pretty butterflies on it that also happens to monitor
    your Web-surfing habits or log your keystrokes.Trojan horses often rely on viruses, worms, andsocial engineering to get unsuspecting users to download them. The term Trojan horse has become shorthand for any program that resideson your computer and provides remote access to an unauthorized person or performs unwanted functions. Most anti-virus (AV) software and some anti-spyware software can detect Trojan horses.
    Spyware, adware, and Trojan horses can?t replicate themselves. Thus, these categories of applications need other ways to spread. For instance, Trojan horses may be delivered as part of the payload of a worm or virus, includedas an e-mail attachment, or bundled with other software. Spyware and adware use similar techniques to spread, but they are most frequently downloaded as part of a ?free? file-sharing program or software utility or via drive-by downloads (in which you visit a Web site that installs the program without your permission).
    Defining Spyware and Adware
    While security risks such as spyware and adware can be seen as an extension of the virus problem, there are significant differences in how these programs are judged as desirable or undesirable and whether you want them on yourmachine.
    Viruses, worms, and Trojan horses are always undesirable and should be automatically removed from a computer. Many types of programs classified as adware and spyware are also high-risk and can have a significant negative impact on computer performance or invade your privacy by transmitting personal information to a third party.
    However, other adware programs are low-risk. They can deliver useful functionality such as games or utilities and have a relatively small impact on privacy and computer performance. Just as broadcast television programs are free because television companies earn revenue from advertising, many software programs are free to download because they too rely on advertising to generate income. Such software programs are called ad-supported programs. They include adware to deliver targeted ads. Some ad-supported software programs seek theuser?s consent
    before installing adware; others do not. Still others operate in a gray area in which user consent is part of the ?fine print? of a software license agreement. We?ll examine these distinctions and what they mean to you more closely in subsequent sections.
    The broad range of spyware and adware or potentially unwanted programs
    can be divided into two general categories: high-risk or malicious programs and low-risk programs. Security researchers assign spywareand adware programs to one of these categories depending on how the programs are installed, what data they try to export from yourcomputer, what impact they have on your computer?s performance, and what you are led to understand about their operation and intent. When security researchers investigate a program?s behaviors to determine risk, they look at a number of key areas, including installation characteristics, stealth properties, privacy impact, integrity impact, performance impact, and ease
    of removal:
    Does the program impact system stability or slow down the network connection?
    Does the program launch pop-up advertisements? If so, how frequently?
    Does the program serve as a means of downloading and installing other security risks (such as additional spyware and/or adware Does the program replace the browser home page or alter search options or
    behavior?
    Does the program cause the release of confidential, sensitive information
    such as bank account numbers and passwords?
    Does the program cause the release of less-sensitive data such as tracking of Web-surfing habits?
    Does the program have a privacy policy, and does its behavior match the
    stated policy?
    Does the program try to hide itself or avoid being uninstalled by the user,
    including an unsolicited reinstallation and techniques to restart user terminated processes?
    Does the program lack an uninstall feature or fail to register in the
    Microsoft Windows Add or Remove Programs area?
    Does the program install itself silently, with little or no indication to the
    user?
    Does the program lack a user interface?
    Does the program conceal its processes or hidethem from the user using
    an obscure name?
    Is the user notified of the program?s presence only through an End User
    License Agreement (EULA)? Does the EULA appear to relate to a different
    program?
    To qualify as high-risk or malicious spyware and adware, programs must have significant impact on system stability and/or performance or release confidential, sensitive information and/or exhibit stealth behaviors such as a silentinstallation, no user interface, and concealment of application processes. Examples of highrisk programs can include keystroke loggers, browser hijackers, and dialers.
    (Table 5.1 describes these and other kinds of programs.) Malicious spyware is illegal and therefore is employed by criminals who want to steal from you. Malicious spyware gets installedon your computer through software vulnerabilities, worms and viruses, social engineering, and drive-by downloads.
    Low-risk programs include many popular commercial adware or ad-assisted
    programs. However, some adware generates multiple pop-up ads and performs other unwanted functions, like changing your home page, directing you to unfamiliar search engines, or installing toolbars in your Web browser that you didn?t
    Spyware Definitions
    Term Definition
    Spyware Spyware is a general class of software programs that monitor computer activity and relay that information to other computers or
    locations on the Internet. Among the information that may be
    actively or passively gathered and transmitted by spyware are
    passwords, log-in details, account numbers, personal information,
    individual files, and personal documents. Spyware may also gather
    and distribute information related to the user?scomputer, applications
    running on the computer, Internet browser usage, and other
    computing habits. Spyware is usually loaded onto a user?s computer
    without the user?s knowledge and is created by underground
    attackers or criminals.
    Adware Adware is a type of advertising display technology?specifically,
    executable applications whose primary purpose is to deliver advertising
    content. Many adware applications also performtracking
    functions and therefore may also be categorized as tracking technologies.
    Consumers may want to remove adware if they object to
    such tracking, do not want to see the advertising generated by the
    program, or are frustrated by its effects on system performance.
    Some users might want to keep particular adware programs if
    their presence is a condition for the use of other free software.
    Adware is created by commercial software companies rather than
    criminals and is often bundled with popular freesoftware, such as
    file-sharing programs. Some adware describes its functions in a
    license agreement and provides uninstall options; other adware
    may install itself without a user?s permission and thwart attempts
    at removal.
    Keystroke logger Keyloggers are tracking technologies that surreptitiously record (also known as a keylogger) keyboard activity. Keyloggers typically either store the recorded keystrokes for later retrieval or transmit them to the remote process or person employing the keylogger via e-mail. Keystroke loggers are used to steal passwords and other identity information.
    Browser hijacker Browser hijackers reset your home page and redirect your browser to unwanted or unknown search engines or other Web sites. Some browser hijackers can prevent you from restoring your home page.
    Browser hijackers work by deleting the entry for the home page
    you?ve selected and inserting their own in a special file that your
    computer consults (the hosts file). They also might intercept
    search queries typed into a legitimate search engine and display
    their own results.
    Browser Helper Object (BHO) BHOs are companion applications for Microsoft Internet Explorer (IE) that run automatically whenever IE is launched. They are a form of state management tool. Many tracking technologies or advertising display technologies are implemented as BHOs. BHOs can search the Web pages a user visits and replace banner ads
    generated by the Web server with targeted ads. BHOs can also
    monitor and report on a user?s surfing behavior and may reset a
    user?s home page. Note that not all BHOs are malicious; many
    legitimate Web browser toolbars are BHOs.
    Trojan horse Trojan horse software masquerades as an innocuous or useful program to trick a user into installing it. Once installed, the Trojan
    horse engages in unwanted or unadvertised functions.
    Remote Access/ RATs are executable applications designed to allow remote access Administration Tool (RAT) to or control of a system. They are a type of remote-control technology. Many legitimate uses of RATs do not pose security threats, but they can be used maliciously, especially when used by someone other than the computer?s legitimate owner or administrator. Dialer Dialers are programs that use a computer?s modem to make calls or access services. Users may want to remove dialers that can
    result in unexpected phone numbers being dialed or unexpected telephone charges. Dialer is a colloquial term for dialing technologies.
    The System Volume Information Folders contain your System Restore points. You can delete all or just the oldest ones manually if youlike (but they must be sequential). These folders are hidden system folders on each drive. In order to gain access, follow the directions below depending on your version of XP and File System:
    Windows XP Professional or Windows XP HomeEdition Using the FAT32 File System
    Click Start , and then click My Computer
    On the Tools menu, click Folder Options
    On the View tab, click Show hidden files and folders
    Clear the Hide protected operating system files (Recommended) check box
    Click Yes when you are prompted to confirm the change
    Click OK
    Double-click the System Volume Information folder in the root folder to open it
    Windows XP Professional Using the NTFS File System on a Domain
    Click Start , and then click My Computer
    On the Tools menu, click Folder Options
    On the View tab, click Show hidden files and folders
    Clear the Hide protected operating system files (Recommended) check box
    Click Yes when you are prompted to confirm the change
    Click OK
    Right-click the System Volume Information folder in the root folder, and then click Sharing and Security
    Click the Security tab
    Click Add , and then type the name of the user to whom you want to give access to the folder. Choose the account location if appropriate (either local or from the domain). Typically, this is the account with which you are logged on. Click OK , and then click OK
    Double-click the System Volume Information folder in the root folder to open it
    Windows XP Professional using the NTFS File System on a Workgroup
    Click Start , and then click My Computer
    On the Tools menu, click Folder Options
    On the View tab, click Show hidden files and folders
    Clear the Hide protected operating system files (Recommended) check box. Click Yes when youare prompted to confirm the change
    Clear the Use simple file sharing (Recommended) check box
    Click OK
    Right-click the System Volume Information folder in the root folder, and then click Sharing and Security
    Click the Security tab
    Click Add , and then type the name of the user to whom you want to give access to the folder. Typically, this is the account with which you arelogged on. Click OK , and then click OK
    Double-click the System Volume Information folder in the root folder to open it
    Windows XP Home Edition Using the NTFS File System
    In Windows XP Home Edition with the NTFS filesystem, you must use the Cacls tool, which is a command-line tool to display or modify file or folder access control lists (ACLs)
    Click Start , click Run , type cmd , and then click OK
    Make sure that you are in the root folder of the partition for which you want to gain access to the System Volume Information folder. For example, to gain access the the C:\System Volume Information folder, make sure that you are in the root folder of drive C (at a "C:\" prompt). To get to the root of any partition, make sure you are in that partition and then type "cd\" (without the quotation marks).
    Type the following line, and then press ENTER:
    cacls " driveletter :\System Volume Information" /E /G username :F
    Make sure to type the quotation marks as indicated. Also, if your user name contains a space you'll need to put your username in quotes. This command adds the specified user to the folder with Full Control permissions
    Double-click the System Volume Information folder in the root folder to open it
    If you need to remove the permissions after troubleshooting, type the following line at a command prompt:
    cacls " driveletter :\System Volume Information" /E /R username
    This command removes all permissions for the specified user

    Monday, April 30, 2012

    E71 Free Symbian Applications I Use (Top 5)

    Here's a list of some FREE apps which i have installed in my E71. I even included a download link for a compilation of all the apps at the bottom of this page, just in case you'd like to download it all in one go (i even added some extras).

    -----

    1. JBAK Taskman v1.00 by JBak



    This would be the very first software i have to install on my E71. Reason? As symbian does not have an application shortcut list, this is one software which provides such feature. So it gives faster access to the apps installed on your device.

    NOKIA E71 PROBLEM: memory card corrupted, memory card in use and memory card locked , need MMC KEY

    OK ever since i got my new NOKIA E71, i seemed to have met with all the 3 problems mentioned above and i assure you it is really frustrating..so i decided to share a bit of experience in this blog just in case somebody else gets the same predicament and also as a reminder for myself..

    MEMORY CARD IN USE

    This was the first problem ever encountered. Whenever i plugged my E71 to PC using the USB cable, i'd get to choose either "Nokia PC Suite" mode or "Mass Media Storage" mode. Whenever i chose Nokia PC Suite mode, i will get an error message saying "F:\ refers to location that is unavailable...bla bla" and therefore i cannot access the memory card. If i choose mass media storage mode, i can access the memory card and carry on with copying stuffs, but when i unplug the phone and browse to my memory card folder, i get the "memory card in use" error in my phone and it stucks there. Only workaround was to restart or reboot my phone and it was really annoying. From forums i browse, some believe that the memory card supplied may have been formatted with a different format which confuses the phone.

    SOLUTION: With the memory card inside the phone, format it using the phone from the memory card menu. GOTO Menu > Tools > Memory Card > Format

    Sunday, April 15, 2012

    ১৫ই এপ্রিল, ২০১২-টাইটানিক ডুবির একশ বছর!


    RMS (Royal Mail Steamer) Titanic নামে বিশালাকার এক জাহাজ প্রায় ২,২০০ এরও বেশী যাত্রী, এবং প্রায় ৯০০ ক্রু নিয়ে সাউথহাম্পটন থেকে নিউওর্ক যাত্রার পথে উত্তর অ্যাটলান্টিক মহাসাগরের এক হিমশীতল জায়গায় প্রকাণ্ড এক বরফ খণ্ডের সাথে ধাক্কা খেয়ে ১৫ই এপ্রিল ১৯১২ সালে ডুবে যায়। সেটি ছিল RMS Titanic এর প্রথম যাত্রা! এত যাত্রী নিয়ে জাহাজ ডুবির ঘটনা ইতিহাসে বিরল।

    ১৯৯৭ সালে হলিউড পরিচালক জেমস ক্যামেরনের অস্কার জয়ী “Titanic” মুভির কল্যাণে এই ঐতিহাসিক জাহাজ ডুবির কথা কম বেশী আমরা সবাই জানি। আজ ১৫ই এপ্রিল তথা ঐতিহাসিক এই জাহাজ ডুবির শততম বছর।

    এতদিন পরে আজও পৃথিবীব্যাপী কোটি কোটি মানুষের রয়েছে এই টাইটানিক নিয়ে নানা আগ্রহ, কৌতূহল! শততম বছর নিয়ে উজ্জাপিত হচ্ছে নানা আয়োজন। এমনকি Titanic মুভিটি 3D ভার্শনে পুনরায় মুক্তি দেয়া হচ্ছে, আরও বৃহৎ পরিসরে উন্মুক্ত করা হচ্ছে টাইটানিক স্মৃতি সম্বলিত জাদুঘর। এ যেনঃ “টাইটানিক ডুবে প্রমাণ করল, সে ডুবে নাই!!” আমরাও চলুন জেনে নিই এর আদ্যোপান্ত।

    টাইটানিক তৈরির পটভূমিঃ

    ১৯০৭ সালে আমেরিকার White Star Line নামের জাহাজ নির্মাণ প্রতিষ্ঠান সকল প্রকার আধুনিক ও বিলাসবহুল সুবিধার কথা মাথায় রেখে তিনটি সর্ববৃহৎ জাহাজ নির্মাণের লক্ষে Olympic class ocean liner ক্যাটাগরির তিনটি প্রোজেক্ট হাতে নেয়। Titanic ছিল White Star Line প্রতিষ্ঠানের দ্বিতীয় বৃহৎতম জাহাজ। অপর দুটি ছিল RMS Olympic ও RMS Britannic । প্রথমে White Star Line এর চেয়ারম্যান J. Bruce Ismay এবং আমেরিকান ফিনান্সার J.P. Morgan ১৯০৯ সালের মাঝামাঝি দৈত্যাকার এবং বিলাসবহুল জাহাজ তৈরির কথা চিন্তা করেন।

    টাইটানিকের সাইডওয়ে ও কাটওয়ে প্ল্যান