Thursday, September 28, 2006

MONITOR

The monitor is a hardware device which physically connects to your video card. The monitor allows information and current status be be visually outputted similar to a TV.

Ther are two types of monitor:

1. CRT - CRT monitors were the only choice consumers had for monitor technology for many years. Cathode ray tube (CRT) technology has been in use for more than 100 years, and is found in most televisions and computer monitors. A CRT works by moving an electron beam back and forth across the back of the screen. Each time the beam makes a pass across the screen, it lights up phosphor dots on the inside of the glass tube, thereby illuminating the active portions of the screen. By drawing many such lines from the top to the bottom of the screen, it creates an entire screen of images.

2. LCD - Short for liquid crystal display, LCD technology can be found in digital watches and computer monitors. LCD displays use two sheets of polarizing material with a liquid crystal solution between them. An electric current passed through the liquid causes the crystals to align so that light cannot pass through them. Each crystal, therefore, is like a shutter, either allowing light to pass through or blocking the light. Color LCD displays use two basic techniques for producing color: Passive matrix is the less expensive of the two technologies. The other technology, called thin film transistor (TFT) or active-matrix, produces color images that are as sharp as traditional CRT displays, but the technology is expensive.

Memory:

Which is commonly referred to as
RAM (Random Access Memory), is a
temporary (Volatile) storage area utilized
by the CPU. Before a program can be run,
the program is loaded into the memory
which allows the CPU direct access to the
program. Memory is a necessity for any
computer and it is recommend that you
have more ram.

Nowadays, computer memory is becoming
cheap, so it is recommended to have a
minimum of 512mb of memory for every
system.

By 2007 Microsoft will release their new OS
Windows Vista, this new OS requires a
minimum of 512mb. But if you still stock to
Windows XP, 256mb is the minimum.

CPU:

Also known as a processor or
microprocessor. The CPU was first
developed by Intel in 1974 and is short
for Central Processing Unit. The
computer CPU is responsible for
handling all instructions and calculation
it receives from other hardware
components in the computer and
software programs running on the
computer.

Today there are several different
manufactures of computer processors.
However, Intel and AMD are the leaders
in the PC market.

Many new computer users may
improperly call their computer and even
sometimes their monitor a CPU. When
referring to your computer or monitor it
is proper to refer to them as either
computer or monitor and not CPU.

MOTHERBOARD:

The main circuit board
of a microcomputer. The motherboard
contains the connectors for attaching
additional boards. Typically, the
motherboard contains the CPU, BIOS,
memory, mass storage interfaces,
serial and parallel ports, expansion
slots, and all the controllers required to
control standard peripheral devices,
such as the display screen, keyboard,
and disk drive. Collectively, all these
chips that reside on the motherboard
are known as the motherboard's
chipset. On most PCs, it is possible to
add memory chips directly to the
motherboard. You may also be able to
upgrade to a faster PC by replacing the
CPU chip. To add additional core
features, you may need to replace the
motherboard entirely. Motherboard is
sometimes abbreviated as mobo.

Hard Drive:

The mechanism that reads and writes
data on a hard disk. Hard disk drives
(HDDs) for PCs generally have seek
times of about 12 milliseconds or less.
Many disk drives improve their
performance through a technique called
caching.

There are several interface standards for
passing data between a hard disk and a
computer. The most common are IDE
and SCSI.

Hard disk drives are sometimes called
Winchester drives, Winchester being the
name of one of the first popular hard disk
drive technologies developed by IBM in
1973.

The Oldest Website

Today there are millions of website exist, infact in just 5 minutes you can build your website and for a few penny you can get your own dotcom domain name.

But did you know that the first website was created on march 15, 1985?
And from March 15, 1985 - August 5, 1986 there were only 20 website created. These 20 website were the only websites you can surf before.

Here are the 20 oldest websites:

Date Created Website
15-Mar-1985 symbolics.com
24-Apr-1985 bbn.com
24-May-1985 think.com
11-Jul-1985 mcc.com
30-Sep-1985 dec.com
07-Nov-1985 northrop.com
09-Jan-1986 xerox.com
17-Jan-1986 sri.com
03-Mar-1986 hp.com
05-Mar-1986 bellcore.com
19-Mar-1986 ibm.com
19-Mar-1986 sun.com
25-Mar-1986 intel.com
25-Mar-1986 ti.com
25-Apr-1986 att.com
08-May-1986 gmr.com
08-May-1986 tek.com
10-Jul-1986 fmc.com
10-Jul-1986 ub.com

New Browser To Leave You Without A Trace

A Firefox-based browser designed to allow anonymous Web surfing has been released by Hacktivismo, a group of human-rights advocates and computer security experts.

The webserver is called "Torpark", it has no installation meaning it can directly be used from a usb drive. The Torpark creates an encrypted connection to the TOR (The Onion Router) network, which supplies a succession of different IP addresses.

"Torpark causes the IP address seen by the Web site to change every few minutes, to frustrate eavesdropping and mask the requesting source," Hacktivismo said in a statement.

When you use Torpark, it will show different ip address every a few minutes to the website your visiting. For example if you are in London, Torpark will show the website that your in Australia and a few minutes it will show that you are in China.

Torpark encrypts data sent to the TOR network, but data isn't encrypted between TOR and the destination Web site. Therefore, be sure not to use user name or password on Web sites that do not offer a secure login and session.

Torpark will cause your surfing slower than the unmodified browser. But this will surely help you to surf the internet without giving up your privacy.

Download Torpark Here.

Increase Internet Bandwidth

Broadband connection are fast. But did you know that you can still increase the speed (bandwidth) of your broadband connection (e.g. Smartbro wireless broadband). You can still speed up your bandwidth by 20% more without cost. Just follow this simple step but be extra carefull because it involves editing your registry.

Because Windows XP seems want to reserve 20% of the bandwidth for its self. Even with QoS disabled, even when this item is disabled. So why not use it to your advantage.

This is for broad band connections.Make sure your logged on as "Administrator". Do not log on with any account that just has administrator privileges.

Click Start>run>type "gpedit.msc"

Expand the "local computer policy" branch

Click "Computer Configuration"

Expand the "administrative templates" branch

Expand the "network branch"

Highlight the "QoS Packet Scheduler" in left window

In right window double click the "limit reservable bandwidth" setting

On setting tab check the "enabled" item

Where it says "Bandwidth limit %" change it to read 0

Reboot if you want to but not necessary on some systems your all done. Effect is immediate on some systems. Some need re-boot.

Change the location of the My Music or My Pictures Folders

In Windows 2000, Microsoft added the ability to right-click the My Documents folder and choose a new location for that folder in the shell. With Windows XP, Microsoft has elevated the My Music and My Pictures folders to the same "special shell folder" status of My Documents, but they never added a similar (and simple) method for changing those folder's locations. But there's an easy way to do that by using the following method.



Open a My Computer window and navigate to the location where you'd like My Music (or MyPictures) to reside.
Then, open the My Documents folder in a different window. Drag the My Music
(or My Pictures) folder to the other window, and Windows XP will update all of the references to that folder to the new location, including the Start menu.

The Power Of F5

If you have a favorite Website chances that you visit it several times in one day. If yes, this tips is for you.

The F5 key is the refresh key. You can press F5 when viewing a Web page to make sure that you have the most current version of that Web page. Because blog is frequently updated by their author, make sure you are currently viewing the updated blog. By using the F5 key, you can refresh the blog and show you the current. This will help you if you frequently visit a blog in a day. And to prevent from being late to catch the newly post to your favorite blog.

Another use of F5 key is to refresh the Windows screen. This can be a handy shortcut. If perhaps you are viewing the contents of a floppy disk and you insert a new floppy, your screen will still show the contents of the first floppy. Just press F5 to refresh the screen and see the contents of the floppy you just inserted.

First Defense To Malicious Attack

Firewall - is a hardware or software solution to enforce security policies. In the physical security analogy, a firewall is equivalent to a door lock on a perimeter door or on a door to a room inside of the building - it permits only authorized users such as those with a key or access card to enter. A firewall has built-in filters that can disallow unauthorized or potentially dangerous material from entering the system. It also logs attempted intrusions.

-is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. (The term also implies the security policy that is used with the programs.) An enterprise with an intranet that allows its workers access to the wider Internet installs a firewall to prevent outsiders from accessing its own private data resources and for controlling what outside resources its own users have access to.

-it is a no brainer to surf the internet without a firewall installed in your computer. There are lots of freeware firewall out there, to name a few....visit http://hezroncomputerzone.awardspace.com

Keep Your Private Files Private

You can deny other user of your computer from reading or accessing your private file by password-protecting it inside a compressed folder. Here's how to do it:

In Windows XP, right click wherever you want to put your compressed folder then choose New from the drop-down menu then select Compressed Folder (or winzip if installed). This will add a compressed folder with the default name New Compressed Folder, change it to whatever folder name you like. Now locate the file and/or folder you wand to protect and move it inside the compressed folder. (You can just copy your files but it will leave your original files unprotected.)

In the File menu of the compressed folder choose Add a Password then type your desired password in the dialog box then click ok.

After that, you have to enter the password everytime you want to access your private files, that makes your private files unaccessible to other user without your password.

Note: Keep a backup of your password protected compressed folder because compressed folder can't keep your files from being deleted.

Notepad Timestamp

Create a new Notepad file. Type .LOG and close the file. From that point on, every time you open the file it will bring you to the end and automatically enter a timestamp ... great for keeping a log of your daily activities!

Saturday, September 23, 2006

BASICdraw 1.0

What is a Prodedural Image Editor ?
A prodedural image editor lets you draw with coded instructions rather than with mouse commands. BASICdraw does include a couple of simple drawing tools, but the power of the editor lies in its ability to allow you to run arbitrary MiniBASIC scripts over images.

What is it good for ?
BASICdraw is good for all those jobs that are hard to achieve any other way, except with expensive software. For instance you want to rotate a logo and paste it into your front cover. Or you want to put a grid over the image. Or you need to add a border ten pixels wide. All very simple things to achieve in code, but hard to do with conventional editing software. Every graphics studio should have a copy.

Do you need to be a programmer ?
BASIC is the easiest programming language to learn. Millions of people who do not consider themselves to be professional programmers know how to use it. If you don't know BASIC already, it is very simple to pick up.
LINK

Notepad++ 3.8

Notepad++ is a free source code editor (and Notepad replacement), which supports several programming languages, running under the MS Windows environment.

LINK

Friday, September 22, 2006

70 Ways To Tell You've Been Online Too Long

1. Tech Support calls "YOU" for help.

2. Someone at work tells you a joke and you say "LOL".

3. You watch TV with the closed captioning turned on.

4. You have called out someone's screen name while making love to
your significant other.

5. You keep begging your friends to get an account so "we can hang out".

6. Three words: Carpal Tunnel Syndrome.

7. You've even gotten on an airplane just to meet some folks face-to-
face.

8. You have to get a 2d phone line just so you can call Pizza Hut.

9. You go into labor and you stop to type a special e-mail to let everyone
know you're going to be away.

10. You have a vanity car tag with your screen name on it.

11. You no longer type with proper capitalization, punctuation, or
complete sentences.

12. You have met over 100 AOLers.

13. You begin to say "heh heh heh" instead of laughing.

14. When someone says "What did you say?" you reply "Scroll up!"

15. You find yourself sneaking away to the computer in the middle of the
night when your spouse is asleep.

16. You turn down the lights & close the blinds so people won't know
you're on-line again.

17. You know more about your AOL friends' daily routines than you do
your own spouses.

18. You find yourself lying to others about your time on-line & when they
complain that your phone was busy you claim it was off the hook.

19. You have an identity crisis if someone is using a screen name close to
your own.

20. You would rather tell people that your bloodshot eyes are from
partying too much than the truth (online all night).

21. You change your screen names so much that you have to look at your
own profile to see who you are.

22. Your kids are standing at your side saying, "Mommy, please come and
cook" dinner and you would rather type another "LOL".

23. You type messages to people while you are on the phone with them at
the same time.

24. You won't work at a job that doesn't have a modem involved.

25. Your dog leaves you.

26. You have to ask what year it is.

27. You write a letter like this.. "dear tom, hiyas! how r u doin well I gotta
go bbl!"

28. You name your pets after people you talk to.

29. You smile sideways...

30. You sign on & immediately get 10 IMs from people who have you on
their buddy list.

31. You look at an annoying person off-line & wish you had your ignore
button handy.

32. You bring a bag lunch & a cooler to the computer.

33. Your significant other kisses your neck while you're chatting & you
think "uh oh cyber sex perv".

34. You have withdrawals if you are away from the computer for more
than a few hours.

35. You use AOL lingo in everyday life (if you still have one he he he).

36. You take a speed reading course to keep up with the scrolling.

37. Your buddy list has over 100 people on it.

38. Your worse comeback to a bully is "I'll slap ya w/a rubber chicken!"

39. You wake up in the morning and the first thing you do is get online
before you have your first cup of coffee.

40. You have to inject no-doze into your butt to keep it awake.

41. You have your computer set so it goes directly into AOL's welcome
screen.

42. You don't know where the time has gone.

43. You end sentences with 3 (or more) periods while writing letters by
hand.

44. You get up at 2am to go to the bathroom but turn on the computer
instead.

45. You don't even notice anymore when someone has a typo.

46. You enter a room & 23 people greet you w/((hugs)) or **kisses**.

47. You stop typing whole words and use things like ppl, dunno and
lemme.

48. Your voicemail/answering machine message is "BRB, leave your s/n &
I will TTYL".

49. You type faster than you think.

50. You got your psychiatrist addicted to AOL too & are now undergoing
therapy in private rooms instead of at his office.

51. You want to be buried with your computer when it dies or vice versa.

52. You actually enjoy the fact that you are addicted.

53. You can actually read & follow all the names of the cast that scrolls up
your TV screen at the end of a movie.

54. People say, "If it weren't for your super reflexes in your eyes &
fingers, you would have been classified as a vegetable!"

55. You dream in "text".

56. Being called a newbie.gif is a "MAJOR" insult.

57. There is absolutely no interesting chat in any room & you're really
bored.

58. You don't want to leave in case you miss something.

59. You double click your TV remote.

60. You can now type over 70wpm.

61. You think about starting a 12-step recovery group for AOL junkies.

62. You are on the phone a minute & need to do something else &
say "BRB" or "BBL".

63. You check your Email and forget you have real mail aka snail mail.

64. You go into withdrawals during dinner.

65. You spend at least 30 minutes making sure you say goodbye to
everyone in a room.

66. You stop speaking in full sentences.

67. You have gone into an unstaffed Tech Support room & ended
up "giving" tech support to other AOLers.

68. You have to be pried from your computer by the "Jaws of Life".

69. You know what a "snert" is.

70. You set your kitchen on fire while cooking dinner because you wanted
to check your mail" & while there you "just wanted to see who was
online".

Thursday, September 21, 2006

WordWeb 4.0

WORDWEB FREE VERSION

WordWeb is a free cut-down version of the WordWeb Pro software. It includes a comprehensive English thesaurus and dictionary, and can be used to look up words from within most programs. Features of the free version include:


Definitions and synonyms
Proper nouns
Related words
Pronunciations

140 000 root words
115 000 synonym sets
Look up words in almost any program

Millions of people from all over the world use this top-rated software.

LINK

PhraseExpress Autotext 3.0

PhraseExpress Autotext is a free text macro utility which organizes & pastes all your frequently used phrases into any application in a snap. Ideal for your letter templates, signatures, addresses, bank account information, etc. The auto complete feature automatically expands abbreviations and corrects typos while you type. The phrases filed are clearly laid out in a taskbar icon. Add new phrases via the Windows clipboard with a single mouse click. Additionally, PhraseExpress can automate your daily procedures, like logging into web accounts. FREE for PERSONAL use only.

LINK

Newspaper Headline Generator



LINK

Warning Sign Generator


Time to warn someone you know of imminent danger! Use this Warning Sign Generator to create a fake warning sign for all sorts of dangerous situations.
LINK

Tuesday, September 19, 2006

Bullet With Your Name Image Generator


They say there is a bullet with a name on it for everyone.

LINK

Countdown Conundrum Generator



It's the Countdown Conundrum Generator with Carol Vorderman.

LINK

Proxy Generator

A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache.

Make your own proxy with this free web proxy generator.
Use this at your own responsibility.
LINK

Insult Generator.

If you ever have the need to insult someone but don't really want them to get mad at you, you need Web Insult. Apart from being a transient amusement, Web Insult insults people in a Monty Python-esk' style.

There are four insult styles to choose from: Modern, Shakespearean, Arabian and Mediterranean. Here are some examples:

You undisciplined sliver of wild belly-button fluff.
You lost eruption of hairy lizard droppings.
You congealed accumulation of fresh cooking fat.
May emergency medical technicians eat each other's belly-button fluff on your lawn.

LINK

Monday, September 18, 2006

Rare Snake Hides In Woman's Panties

NUREMBERG, Germany --A rare Filipino snake smuggled itself into Germany by hiding in a female tourist's panties. The green ring snake survived a long-distance flight and even a tumble in a washing machine.

The woman, 31, from Nuremberg, Germany, put her dirty undies in the machine after returning from a trip to the Philippines, but she only spotted the snake when she opened the door to take out the wash.

Experts from a local zoo were called in to collect the snake and have given it a new home in their reptile house.


Now I can understand how a snake might of gotten there. How didn't she know it was there while wearing the panties? Something fishy here.

Saturday, September 16, 2006

Bruce's Unusual Typing Wizard 1.0

This is a typeing tutor appropriate for both beginners and advanced typists, it also contains a game in which each letter must be typed before it hits the floor. LINK

Friday, September 15, 2006

MovieCal 2.1

MovieCal is a simple calculator/converter for film and video length with many options. It converts timecodes (24,25,30fps), lengths (feet, meters) and framecounts and calculates size and volume of data. MovieCal is freeware and available for Windows,MAC, and Linux, it contains four calculators/converters: film and video length converter; film and video length calculator; file size/dpi calculator; volume of data calculation.
Note: unfortunately the entire website is in German but there is a 6.5 Mb PDF "ReadMe" download file in German & English that should provide all the info necessary! Both CNet's Download.com and Softpedia rate it as freeware plus Softpedia says the file is clean LINK

The Weather Man 1.0

The Weather Man is a small but robust weather station. It makes use of an Internet connection to determine the weather in your area. Simply run it, select your city and allow The Weather Man to keep you informed about the weather outside as well as the current temperature, pressure, wind direction and strength. LINK

Steps to Trouble-Free Computing 3/10

Tuneup Your Hard Disk Regularly

Because it is the place where you permanently store your applications and, more important, the data files you create with those applications, your hard disk requires special attention to keep it operating at peak efficiency. Disk scans for "lost" files and bad sectors will prevent most disk problems before they occur, while running a disk defragmentation utility will improve the performance of your system.

Every day, you create new files, delete unwanted ones, and write updated versions of current files to your computer's hard disk. Because of the way Windows and the Mac OS assign disk space to files, your hard disk can become fragmented over time (i.e., your files get placed in pieces all over the hard disk, because there is no contiguous space large enough to hold them). A fragmented hard disk slows disk access and makes it harder to recover from disk errors.

To defragment a Windows 95/98/ME/XP hard disk, use the Disk Defragmenter program in Programs/Accessories/System Tools. On a Mac, use a utility such as the Speed Disk tool that comes with Norton Utilities for the Macintosh. You should defrag your hard disk every six months. You should also defrag it after you have created or deleted a lot of files in a short span of time.

Occasionally, a storage area called a sector on your hard disk goes bad. A utility called a disk scanner detects such "hard" errors and keeps a table of such sectors so that your operating system doesn't try to use them to store files. In addition, a disk scanner detects "soft" errors, where the operating system has lost track of pieces of one or more files. ScanDisk (found in Programs/Accessories/System tools) is Windows 95/98/ME/XP built-in disk scanner, and it detects both hard and soft errors. On the Mac, you can use the Disk First Aid program that comes with your system or the more powerful Disk Doctor utility included in the ubiquitous Norton Utilities for Macintosh. You should run a hard disk scan at least every month. In addition, if your computer crashes or you accidentally shut down without going through the proper shutdown procedure, run a disk scan as soon

Thursday, September 14, 2006

Random Key 1.0

Random Key is a prank program that will type a random letter or number every 60 seconds on the subject's computer, to disable it, reboot. LINK

Harry's Filters 3.0


Harry's Filters is a Photoshop-compatible plug-in containing 69 different image effects that can be used with dozens of different image editing applications such as Photoshop, Paint Shop Pro, Gimp, IrfanView, XnView, and many others (full compatibility list on website). The main effect categories are called Color, Artistic, Gradients, Patterns, Warp, Noise, En/Decrypt and Other. Options for saving and opening effect presets, an animatable preview feature and a random effect button are included, too.
LINK

Water Ripples Plug-in 1.3



Water Ripples Plug-in is a freeware Adobe Photoshop compatible plug-in filter. The highly realistic water ripples effect designer has numerous options as well as an impressive 3D quality. The random settings generator produces unlimited variations of rippled surfaces.
LINK

YeahReader

YeahReader is a free program for reading news feeds in RSS, RDF and Atom formats, and podcasts.

The program provides all basic RSS reader functionality such as a convenient feed update system, proxy support and pop-up update notification. Besides this, YeahReader has such features as built-in blog client that will allow you to quickly write messages to your LiveJournal, Blogger, WordPress or Delicious blog, OPML support, ability to export data into HTML, CSV or JS format, multilanguage support and others. LInk

Wednesday, September 13, 2006

Contact Numbers 1.5

Contact Numbers, an easy to use way to store the contact details of friends, colleagues etc. There are plenty of brilliant personal information managers available, if you need what they have then this probably isn't for you ;) DOWNLOAD

AutoHotkey

AutoHotkey is a free, Open-Source utility for Windows. It has four primary features: 1) automating repetitive tasks, 2) creating hotkeys for keyboard, mouse, joystick, and handheld remote controls. 3) expanding abbreviations as you type, 4) creating custom data entry forms, user interfaces, and menu bars LINK

Vorbital Player Version 1



Download Vorbital Player Version 1

Vorbital is an Ogg Vorbis file player. It uses OpenAL and is small and compact in order to take up as little screen space as possible (though you can, of course, resize the window if you would like a larger playlist). The GUI was developed using wxWidgets.

The functions of most of the buttons are obvious, but just in case you can't tell at first glance the folder-shaped button on the left allows you to add a file to the playlist and the minus symbol allows you to remove a file from the playlist. Double-clicking on a file in the playlist will cause it to start playing.

If, for some reason, you have trouble getting audio to play using this program, you should install the OpenAL redistributable, which is available HERE (Creative Labs' site).

A few sample Ogg Vorbis files (shown in the playlist) are available at http://www.vorbis.com/music/

Tuesday, September 12, 2006

ShutdownXP Enforcer 6.3


A very powerful tool to immediate Shutdown or Restart Windows 2000 and XP Operating Systems' based computers (the last chance before the Reset button).


• Use it only if you have serious reasons not to follow the ordinary Shutdown/Restart procedure (i.e. an application that refuses to close, a system freeze, etc.).
• It's a System Tray Application and uses a very small amount of resources when running.
• It gives you the ability to create a Shutdown and a Restart shortcuts on your Desktop for the occasion of a System's Tray failure. LINK

Nanny Shutdown v1.2


This tool will automatically shutdown your computer after consuming a predefined time credit a day.

LINK

What's the WinKey used for on the Windows keyboards?

  • WinKey = Displays taskbar and Start Menu
  • WinKey + E = Opens Explorer
  • WinKey + F = Opens Find
  • WinKey + R = Opens Run
  • WinKey + D = Maximize/Minimize all windows
  • WinKey + M = Minimize all windows
  • WinKey + Pause = Opens System Resources
  • WinKey + Tab = Flip between open application in the taskbar
  • WinKey + CTRL + F = Finds a computer
  • WinKey + Shift + M = Maximize all "WinKey + E" minimized windows
  • WinKey + Break = Displays the System Properties sheet

How can I find sites that have links to my home page

To see a list of all the sites that have links to your home page, do the following:

  1. Copy the following text to the clipboard
    +link:http://yoursite.com/ -url:http://yoursite.com/
  2. Link to Alta Vista
  3. Paste the text into the search box
  4. Replace "your.site" with your site's URL
  5. Click the Submit button
  6. Alta Vista will display a list of sites that have links to your home page

In Google, do this:

  1. Go to Google
  2. Type in the following (replacing your domain name where appropriate)

    link:yoursite.com
  3. Click on Google Search and it will display sites linking to you.

How to Delete AOL Instant Messenger

AOL Instant Messenger is installed when you download and install Netscape Communicator (since Netscape is now owned by America Online). However, it can be VERY annoying since the little yellow "running man" icon will load every time your system is connected to the Internet.

Follow these instructions to rid your system of the AOL Instant Messenger:

If you simply would like to disable the Instant Messenger icon from activating do this:

Start AOL Instant Messenger (AIM).
Click on Setup.
Click the "Misc." tab.
Uncheck "Start Netscape AIM when Windows starts".
Click OK.

However, if you'd like to completely remove it from your system, you'll have to follow this more complicated procedure (BEWARE: this involves editing the registry - PLEASE do not do this if you are not comfortable with the Windows registry and are willing to accept the consequences if something goes wrong).

Remove AIM from Personal Bookmark folder as follows. In Netscape Navigator, go to the Communicator menu and click "Bookmarks". Click "Edit Bookmarks" and then select and delete the "Instant Message" reference.

Using the FIND command under the Start Menu, delete the file "launch.aim" from every user profile directory on your hard drive. You'll likely find it in c:\program files\netscape\users\yourname, where "yourname" is the name of your user profile.

Next, close all Netscape windows that you are currently running. In Windows Explorer, find the "AIM" folder, likely in c:\Program Files\Netscape\Communicator\Program\". Delete the AIM folder.

Run the program Regedit, by going to START/Run and type regedit. This will start the Registry Editor. Be careful, one wrong move will destroy the registry.

Click on Edit, then "Find" and type in "AIM" (no quotes). Delete all references to AIM that are found..

Now, exit Regedit and restart your computer.

Once the computer is restarted, you should be rid of the AOL Instant Messenger icon.

Steps to Trouble-Free Computing 2/10

Make an Emergency Boot Disk

If your computer develops a problem that keeps it from accessing your hard disk, you need some other way to boot your system. The answer is an emergency boot disk.

Macintosh systems come with either a bootable CD-ROM or a bootable floppy disk, as does Norton Utilities for Macintosh -- a must for all Mac owners. If you are using Win95/98/ME, you need to make an emergency boot disk, which you can make with the Add/Remove Programs control panel. Select the Startup Disk tab, and you're led through the process



On Windows XP, you can generally boot directly from the Windows XP CD-ROM, however in some cases you may still need a set of boot floppies. In this case, click one of the links below to download a program to create boot floppies for Windows XP Home or Windows XP Pro editions.

Windows XP Home Edition Boot Floppy Creator

Windows XP Pro Edition Boot Floopy Creator

Under Windows 3.1, you have to create the disk yourself. Go to the DOS prompt and enter the following commands. Be sure to have a blank floppy handy.

FORMAT /S A:
COPY C:\AUTOEXEC.BAT A:
COPY C:\CONFIG.SYS A:
COPY C:\WINDOWS\SYSTEM.INI A:
COPY C:\WINDOWS\WIN.INI A:

Now, if you can't boot from your hard disk, you will have a way to get your system started so you can deal with the problem.

For other Windows Operating Systems, visit Bootdisk.com to download a boot disk creator for your version of Windows or DOS.

Monday, September 11, 2006

Sunday, September 10, 2006

Sdrawkcab Klat (Talk Backwards).

Hey everybody wherever you are

They've got a new way of talking and it's

Gonna go far; you take the letters in the

Words, turn 'em around; say the last one

First and check out the sound, Talk Backwards

LINK

Bonzi Buddy Removal Instructions and Help

What is Bonzi Buddy?
He's your interactive friend and traveling companion on the Internet! He walks, talks, sings, browses and searches the Internet with you. That's according to the website...he's also very annoying.

How to I Remove Bonzi Buddy?

BonziBUDDY is easily removed following these instructions:

1) First you need to close the Bonzi Buddy Program. Click on Bonzi and say "Goodbye" to close him. Next, Right-click on the dollar sign icon next to your clock and choose "Exit."

2) Now click on Start > Programs > BonziBUDDY > Uninstall BonziBUDDY Bargain Hunting Tool and allow the uninstall program to finish.

3) Go to Start > Programs > BonziBUDDY > Uninstall BonziBUDDY and allow the uninstall program to complete.

4) Finally, restart your computer.

Sometimes the uninstall is not successful because a manual removal was tried previously, or a key file was deleted that the uninstall process needs. In these cases, reinstall the Bonzi Buddy software and then proceed with a normal uninstall shown above.

There is no need to delete any files first. All you need to do is visit

http://www.bonzi.com/bonzibuddy/bonzibuddyfreehom.asp

and download the BonziBUDDY files again. This will be a fast process if you already have most of the files installed, since the install will only download and install the files you don't have or ones that have been updated since your last download or update.

Once you have successfully run the install of BonziBUDDY again, just follow the instructions in #1 above to uninstall BonziBUDDY.

Clean up after Uninstalling

When BonziBUDDY is uninstalled, there are a few small files left in your BonziBUDDY directory that will remind Bonzi what your settings and preferences are should you ever decide to install him again. They are very small and will not harm your computer in any way, but it is safe to delete this folder if BonziBUDDY is already removed from your system.

Steps to Trouble-Free Computing 1/10

Step 1: Know Your System

The first preventive step you need to perform is to take an inventory of your computer system. This information will be vital if you later have to contact technical support or have your system serviced.

Start by noting your serial number and model number. With this information, your system manufacturer can determine the components of your system. If you've added components to your system, note the model and version numbers of the components. You'll find this information in the documentation that accompanies add-on hardware.

A definite must-have program to complete a system inventory is Belarc Advisor, a free program showing a detailed profile of your installed software and hardware, missing Microsoft hotfixes, anti-virus status, CIS (Center for Internet Security) benchmarks, and displays the results in your Web browser.

Beyond these basics, you need to get details of your system's configuration. On Windows PCs, this means copying and printing a few important system files that will come in handy if you later have a problem or need to speak to a tech-support person. The simplest way to preserve your system configuration files is to run the Sysedit program. With Windows 95/98/ME, click on Start, RUN, type SYSEDIT in the blank window, and click OK. It will bring up all your system files -- from AUTOEXEC.BAT to SYSTEM.INI -- in Wordpad windows. From there, you can save them to a floppy disk and print them out. In Windows 3.1, you'll find the Sysedit icon in the Main group. With Windows XP/2000, you can go into Accessories, System Tools, System Information to find and print this important data.

If you own a Mac, you don't need to copy system files, but you should make a list of all the INIT and CDEV files -- collectively called system extensions -- that load on start-up. Conflicts among these files are a common source of program crashes on Macs. You can see a list of these files using the Extensions Manager Control Panel, which also lets you turn off one or more extensions so that, by process of elimination, you can identify which one is causing you problems. One limitation of Extensions Manager is that it doesn't let you print a list of extensions. If you want a list, you have to print the Screen.



Is It A Virus or a Hoax?

It seems as if the minute a new person logs on to the Internet they get a flood of email warning of dire consequences if they open an email with a certain subject line. There are viruses that can be transmitted via email, however a lot of these so-called viruses are imaginary. They are myths, let's face it is it really believable that Disney would giveaway trips by simply responding to an email, or Bill Gates sending money to people who kept an email chain letter moving through cyberspace? There are many of these email hoaxes floating around the Internet at any given time.

Hoaxes become viruses simply by individuals forwarding the hoax across the Internet to other unsuspecting individuals, these individuals read the warning and forward it on to still more people. Thus the "virus" spreads throughout the Internet.

The next time you receive an email warning of potential hazard to your computer if you open an email. Go check out the following webpages in particular to see if there is any truth to the message. An email may in fact contain a virus, but please check out the following pages to verify its authenticity before forwarding it on to someone.

The first place to visit to determine if something is a hoax or not is the

U.S. Department of Energy's Computer Incident Advisory Capability

Hoaxes described on this page: PKZ300, Irina, Good Times, Good Times Spoof, Deeyenda, Ghost PENPAL GREETINGS!, Make Money Fast, NaughtyRobot, AOL4FREE, Join the Crew, Death Ray, AOL V4.0 Cookie, A.I.D.S. Hoax, Internet Cleanup Day, Bill Gates Hoax, WIN A HOLIDAY, AOL Riot June 1, 1998, E-mail or get a Virus, Bud Frogs Screen Saver, Disney Giveaway Hoax.

Another place to visit is

Computer Virus Myths Homepage

If the email or file is listed on one of these two pages, it's probably a myth. If it is, please don't forward it to anyone. Internet chain letters just clog the Internet, slowing it down for everyone.

Also, most of the Anti-Virus companies have pages dealing with hoaxes, click on the links below to visit them.

JDBGMGR.EXE Hoax and how to recover file

Symantec Norton Anti Virus Hoax page

Trend Micro's Hoax Encyclopedia

How to Delete Undeletable Files in Windows

Many times when trying to remove an unwanted program, especially a piece of adware or spyware, you may run across a file that is undeletable by any normal method. When you try to remove it you'll receive the error message shown below telling you "access denied" and explaining the file may be in use. You may also receive one of the following messages.

Cannot delete file: Access is denied
There has been a sharing violation.
The source or destination file may be in use.
The file is in use by another program or user.
Make sure the disk is not full or write-protected and that the file is not currently in use.


So if the file is in use, how do you delete it?

I'll show you several ways of removing these types of files and even some freeware programs that help you remove these pesky undeletable files.

Windows 95/98/ME

If you are using Windows 95, 98, or Windows ME, the easiest way to remove an undeleteable file is to boot to a DOS prompt and manually delete the file. Before you do this, you'll want to make a note of the location of the file including the entire path to it. Follow the steps below to delete these types of files.

If you already know the path to the file, please skip to Step 7
  1. Click on Start, Find, Files and Folders
  2. Type the name of the undeletable file in the Named or Search For box
  3. Make sure the Look In box shows the correct drive letter
  4. Click on Find Now or Search Now and let the computer find the file
  5. Once the file is located, right-click on it and choose properties, make a note of the file location. Usually this is something similar to

    c:\windows\system32\undeleteablefilesname.exe
  6. Close the search box
  7. Locate a boot disk for your version of Windows, if you do not have a boot disk, follow the steps on the link below to create an emergency boot disk.

    How to Create an Emergency Boot Disk for Windows

  8. Shut down and restart your computer with the boot disk in your floppy drive.
  9. The computer will boot to a DOS prompt that will look similar to

    c:\

  10. Type the following command and press Enter to delete the filer, substituting the phrase with the actual path and file name you discovered in Step 5 above.

    del

    Example:

    del c:\windows\undeleteablefile.exe
  11. Remove the boot disk in the floppy drive and restart your computer
  12. The file should now be deleted.

Windows XP

In Windows XP, there are a couple ways to remove an undeleteable file, a manual way, and a couple automated ways using some freeware programs. First, I'll show you the manual way.

Manual Method

If you already know the path to the file, please skip to Step 7
  1. Click on Start, Search, All Files and Folders
  2. Type the name of the undeletable file in the box shown
  3. Make sure the Look In box shows the correct drive letter
  4. Click Search and let the computer find the file
  5. Once the file is located, right-click on it and choose properties, make a note of the file location. Usually this is something similar to

    c:\windows\system32\undeleteablefilesname.exe

  6. Close the search box
  7. Click on Start, Run, and type CMD and Press Enter to open a Command Prompt window
  8. Leave the Command Prompt window open, but proceed to close all other open programs
  9. Click on Start, Run and type TASKMGR.EXE and press Enter to start Task Manager
  10. Click on the Processes tab, click on the process named Explorer.exe and click on End Process.
  11. Minimize Task Manager but leave it open
  12. Go back to the Command Prompt window and change to the directory where the file is located. To do this, use the CD command. You can follow the example below.

    Example: to change to the Windows\System32 directory you would enter the following command and Press Enter

    cd \windows\system32

  13. Now use the DEL command to delete the offending file. Type DEL where is the file you wish to delete.

    Example: del undeletable.exe
  14. Use ALT-TAB to go back to Task Manager
  15. In Task Manager, click File, New Task and enter EXPLORER.EXE to restart the Windows shell.
  16. Close Task Manager
Programs to automatically delete a file

Remove on Reboot Shell Extension
This is a nice extension that loads into the right click menu. All you have to do is right-click on a file and choose "Remove on Next Reboot" and the file will be deleted the next time the computer restarts. Although it probably should only be used by more advanced computer users since it may be TOO easy to delete files using this program.

Pocket Killbox
A simple .exe file that you can use to delete undeleteable files, although the program will also delete temporary files, edit the HOSTS file, and more. A definite must have program when you are fighting an annoying spyware or adware program that won't remove.

Unlocker
Unlocker is another program that runs from the right click menu. Its simple and very effective. The website even has a side by side comparision of other programs that accomplish this task.

Using one of the three tools shown above, you should be able to remove those annoying undeleteable files once and for all.

N.Y. Woman Wins $1 Million Lottery Again

NEW YORK - A woman who won $1 million from a state lottery game four years ago has improbably hit the jackpot again.

Valerie Wilson, who works at a Long Island deli, said she won another $1 million on a lottery scratch-off game last month.

"The first time I couldn't believe it," Wilson told Newsday. "This time I said, 'God's on my side.'"

Wilson, 56, beat some long odds to pull off her double victory.

In 2002, her winning ticket in the Cool Million scratch-off game, which has since been discontinued, was a shot of 1 in 5.2 million, according to the New York State Lottery. Last month, she beat odds of 1 in 705,600 when she got the $1 million prize in the New York lottery's Jubilee scratch-off game.

Overall, her chances of winning both games were a slim 1 in 3,669,120,000,000.

A lottery spokeswoman verified Wilson was a Cool Million winner in 2002, but declined to confirm her latest win until a planned news conference. There have been only two previous repeat million-dollar-plus winners in the lottery's history, according to the state.

Wilson still hasn't quit her job at Emma's Deli and Catering. Despite her unexpected bonus, Wilson plans to keep working until at least December, making sandwiches and ringing up sales.

The prize will be paid out in $50,000 installments over 20 years. Wilson said she used her first winnings to help buy homes for her three children.

"This one is going to be for me," she said. "I'm going to live a little bit."

Saturday, September 09, 2006

Celebrity Tanning Secrets

The secret's out: Mariah Carey's golden tan line.

Mariah Carey is developing a new fake tan made with 24-karat gold dust.

The singer is insisting she is beautifully bronzed on every night on her current 'Emancipation of Mimi' tour and has hired a personal tanning assistant, Jenny Phillips, to spay her before going on stage.

I wonder how many people in the world are employed as a personal tanning assistant?

In the past, Mariah has paid for her Jack Russell dog - named Jack - to fly first class, refused to walk up or down stairs, requested a red carpet be rolled out for her arrival at a London hotel and reportedly demanded toffee.

You Must Be Baptized To Ride This Bus

In the UK: Free travel denied to schoolgirl.

An 11-year-old girl starting at a new school has been denied transport by coach because she is not baptised.

Hertfordshire County Council claims the transport requirement was explained to her parents before they sent her to a Church of England school in St Albans. Sydnie Jai lives with her mother Frances Wood at Hatfield - a journey of about eight miles to the school.

Mrs Wood said Sydnie is too young to consider baptism and she felt she was being discriminated against.

A school spokesperson defended the decision:

"We think it quite reasonable when offering transport to faith schools that parents show that the child is of that faith.

And what better way to show that a child is faithful than by dunking the kid's head in water?

Snake Goes From Weapon to Wounded

NEW YORK - Snake's alive! A boa constrictor was recovering Friday at a Manhattan animal shelter, one day after it was injured by a man who was waving the six-foot snake at passers-by on a Brooklyn street, authorities said.

"The boa is resting, healing, and our medical technicians are keeping an eye on it," said Richard Gentles, spokesman for the Manhattan Animal Care Center. The snake was brought to the facility on Thursday with an injury to its lower jaw, reportedly when the man stabbed the boa with scissors.

Center authorities planned to transfer the snake to a permanent home outside of New York City, where the creatures are illegal, Gentles said. A licensed wildlife rehabilitator will take custody of the wounded snake.

"Sometimes they go to zoos, sometimes to sanctuaries, and sometimes they're used for educational purposes," he said.

Woman in Wheelchair Shoots Alleged Mugger

NEW YORK - Margaret Johnson's wheelchair might have made her look like an easy target. But when a mugger tried to grab a chain off her neck Friday, the 56-year-old pulled out her licensed .357 pistol and shot him, police said.

Johnson said she was in Harlem on her way to a shooting range when the man, identified by police as 45-year-old Deron Johnson, came up from behind and went for the chain.

"There's not much to it," she said in a brief interview. "Somebody tried to mug me, and I shot him."

Deron Johnson was taken to Harlem Hospital with a single bullet wound in the elbow, police said. He faces a robbery charge, said Lt. John Grimpel, a police spokesman.

Margaret Johnson, who lives in Harlem, has a permit for the weapon and does not face charges, Grimpel said. She also was taken to the hospital with minor injuries and later released.

Trio Accused of Gunpoint Prayer Session

ATHENS, Ala. - A woman and two roommates are accused of holding her brother at gunpoint as she prayed for his repentance, even firing a shot into the ceiling to keep his attention.

Randy Doss, 46, of Athens said he fled the house when his captors got distracted and later went to police, who were skeptical at first because his story was so bizarre. But police said it checked out, including the bullet hole in the ceiling.

"We found where they patched the hole with caulk," said Sgt. Trevor Harris.

Police said the sister, Tammie Lee Doss, 43, Donna Leigh Bianca, 37, and Ronald David Richie, 45, who live at the Athens house, were charged with unlawful imprisonment, a misdemeanor. The two women were also charged with menacing, a misdemeanor. All were released on bond.

Harris said Randy Doss went to the house about 7 p.m. on Labor Day and at some point got in an argument with the two women about religion. When they prayed for him, he laughed.

"They both got upset and pointed pistols at him," Harris said. "They wouldn't let him leave. Bianca fired one round in the ceiling in the hallway a few feet from the victim's head."

Harris said the women tried to get Doss to admit things he did as a child.

"She claims the brother wronged her years ago when they were kids and she just got the truth out of him and apparently wanted revenge," said Harris. "He says they would not let him go. The sister says she was just trying to scare her brother."

The three suspects denied they held Doss against his will.

"The door was never locked and he could have walked out that door any time he wanted to," the sister told the News-Courier of Athens. "We never held him against his will."

Harris said Richie did not have a weapon but is accused of blocking the door to keep Doss from fleeing.

Doss said he escaped the house about 1 a.m. Tuesday.

"We don't know if they were just playing games, but it is ridiculous for men and women in their 40s to be playing games like this," Harris said.

Bridget Jones' Knickers on Auction Block

LONDON - The famously large underpants worn by film character Bridget Jones are to be auctioned off to raise cash for some of London's most famous green spaces.

The large, white underwear was worn by Renee Zellweger in her role in "Bridget Jones's Diary" and prompted the comment, "Hello, mummy!" from Hugh Grant, who played her suitor, Daniel Cleaver.

The underwear, signed by Grant, will be auctioned off at a charity dinner next week for Britain's Royal Parks Foundation, it was announced Friday.

Organizers hope the dinner will raise $185,000 for the Royal Parks, which provided the setting for scenes in the second film in the series, "Bridget Jones: The Edge of Reason." One scene in the movie took place in a fountain at Kensington Gardens; another was shot at Regent's Park.

The Royal Parks are some of London's most popular, and also include Hyde Park, St. James's Park and Green Park.

Jilted Bride Turns Wedding Into Benefit


VERGENNES, Vt. - A woman who learned six weeks before her wedding that her fiance was cheating on her is turning her would-be reception into a charity benefit.

"I'm really just trying to turn it around and make something positive out of it," said Kyle Paxman.

Paxman, 29, had planned to celebrate her nuptials at the Basin Harbor Club on Lake Champlain on Saturday. When she found out about her fiance, she called off the 180-guest wedding and the four-year relationship.

She and her mother canceled the band, photographer and florist, but learned they would not be reimbursed for the reception and block of rooms they had reserved. So they turned the reception into a benefit for the Vermont Children's Aid Society and CARE USA, an international relief organization that aims to combat poverty by empowering women.

They sent out invitations to 125 women for drinks and a gourmet four-course dinner. In exchange, they hope the guests will make donations to the charities.

Friday, September 08, 2006

Dynamic Sign Generator


Another Sign Generator,this time from Italy.

[ Dynamic Sign Generator ]

Collage Generator.


Create a unique collage from a single photograph. Choose one of two styles: a 'joiner' style image without frames or an image created from simulated Polaroids. Every generated image is unique. This toy was inspired by the photo collages of the artist David Hockney. Works with your photos hosted on Flickr or anywhere else.
[ Collage Generator ]

Cemetery's Flags Found in Squirrel Nest

EAU CLAIRE, Wis. - Groundskeepers at Forest Hill Cemetery thought it was kids who were stealing dozens of American flags. That is, until one found a giant squirrel's nest.

"I was mowing, looked up out into the distance, and something caught my eye," said Dave Ender, a groundskeeper employed by the Eau Claire Parks and Recreation Department.

He drove his riding lawnmower to a nearby street intersection and looked up a tree.

"Low and behold, I found the missing flags," Ender said.

They were ripped and serving as the foundation of a giant squirrel nest.

"I never seen anything like that before," he said.

No one at the cemetery had ever seen a squirrel with a flag in its mouth, either.

"They must have done it at night, or very early in the morning," Ender said.

"Those little rascals, they're just amazing," he said.

Police: Man Robs Bank to Be 'Supported'

MANCHESTER, N.H. - Police said Gaetan Roy had just lost his job, so he came up with a plan: Rob a bank, hang around, then get taken to jail to be "supported."

Roy has been charged with robbing a St. Mary's Bank. Police said he walked into the bank Friday and handed a note to the teller that said: "This is a robbery. Put all the cash into the plastic bag. No hassles, no problems."

Roy left the bank with about $1,300. When officers arrived, they found Roy in a Dunkin' Donuts parking lot next to the bank, drinking an iced coffee. Police said he had the note and cash stuffed in his pockets.

"It appears he didn't make any furtive gestures," Sgt. Lloyd Doughty said.

Tenn. City to Pull 'Goats Working' Signs

CHATTANOOGA, Tenn. - City workers planned to remove signs in a neighborhood warning drivers to slow down for kudzu-eating goats in the area, after the public works department said they were posted illegally.

The goats were released recently in part of the Missionary Ridge area to hellp control rampant kudzu growth.

But orange signs reading "goats working" and warning of a $250 "goats fine" were not posted by the city, said Lee Norris, deputy administrator of public works.

"It's coming down," Norris said. "It's just somebody's idea of a joke."

The signs were good enough to fool some residents, said Bob Graham, vice president of the Missionary Ridge Neighborhood Association.

"Some people took it seriously and thought it was something Public Works had put up there," he said. "Someone went to a lot of trouble for it."

Graham said he thought it was a good idea to let area residents know the animals are authorized to be in the area, but no signs have been approved.

Resident Betsy Bramlett thought the signs were funny, but thought a different warning may be needed for the electric fence keeping the goats confined to the kudzu-covered area.

"As a safety matter, they should have some kind of sign saying, `electric fence, don't touch,'" she said.

Man's Gun Fires in Wal-Mart Bathroom

HUDSON, N.H. - A Nashua man faces a felony reckless conduct charge after his gun discharged in a Wal-Mart bathroom, striking the ceiling and scaring an employee in the next stall.

Charles Masterson, 36, said he pointed his gun toward the ceiling because he had been taught that was the safest thing to do when it wasn't being used.

The precaution backfired when the gun discharged Tuesday night while Masterson was in the bathroom.

Police charged him for putting the teenage employee in danger. Masterson's 13-year-old son also was in the bathroom.

Masterson was jailed overnight, but released on personal recognizance Wednesday after his arraignment in Nashua District Court.

Masterson said he had been carrying the Glock 9mm pistol in his waistband.

The Wal-Mart employee, Adam Carew, 17, of Dracut, Mass., told police he was in the handicapped accessible stall when he heard the gunshot. Carew said he ran out and saw Masterson's son covering his ears.

Carew told police Masterson walked out of his stall, put the gun in his pants and just walked right out of the bathroom like nothing happened.

Wal-Mart employees called police.

Woman, 79, Charged in Toy Gun Robbery

CHICAGO - A 79-year-old South Side woman bearing a toy gun and a visor that read "Princess" has been charged with trying to rob a downtown bank.

Melvena Cooke was charged Wednesday with attempted bank robbery. She is free on $4,500 bond and was released into her daughter's custody.

Cooke walked into the Bank of America branch Tuesday morning and told a teller that she'd just come from the dentist and could only speak quietly, according to an FBI affidavit.

As the teller leaned in, Cooke whispered a demand for $30,000 and brandished a gun that turned out to be a toy, the affidavit says. Instead of handing over any money, however, the teller triggered a silent alarm and walked away.

Cooke left empty-handed after several minutes and then ducked into a nearby store, where she was arrested.

Officials said Cooke was dressed for the attempted heist in a black trench coat, sunglasses and a white "Princess" visor.

She faces up to 20 years in prison if convicted, according to the U.S. attorney's office.

Burlesque Heats Up Global Warming Event

SYDNEY, Australia - A saloon-style striptease, complete with corsets and balloons, at an Australian government-sponsored conference on global warming left some scientists hot and bothered and the organizers in boiling water.

The show was cut short and organizers issued an apology after some delegates at the Australia and New Zealand Climate Forum's dinner in Canberra walked out in disgust at what was intended as a lighthearted break from the weighty business of rising temperatures.

Rebecca Gale, who led the team of dancers from Miss Kitka's House of Burlesque, said the performance was in reasonably good taste and she didn't understand what the fuss was about.

Gale said she emerged into the function room during dinner wearing a heavy corset, black fishnet stockings and at least a dozen balloons, which she invited delegates to pop as she danced to Peggy Lee's sultry 1958 hit "Fever."

"The most that any of the girls get down to is vintage lingerie, which is corsetry and stockings," Gale told Australian Broadcasting Corp. radio on Friday. "It's not like we were doing full nudity and simulating sexual acts or anything like that."

"There was not even a midriff on display," she said.

But some in the audience objected to the Wednesday night show in Australia's old Parliament House, and the dance troupe was asked to stop about 10 minutes into a 45-minute routine, Gale said.

The Australian National University, which organized the conference, issued a statement the next day apologizing for any offense caused.

"The intent was lighthearted entertainment," the statement said. "In retrospect the choice of entertainment was inappropriate for the occasion. We understand if the sponsors wish to withdraw."

The government did.

When Environment Minister Ian Campbell got wind of the show, he canceled his department's 3,000 Australian dollar ($2,290) sponsorship, and the Agriculture Department followed suit, withdrawing A$5,000 ($3,800).

"I am appalled at what happened," he said.

Prime Minister John Howard was less prudish.

"My reaction is well, probably not appropriate, but I'm not going to list it for discussion at the next meeting of the national security committee," Howard told the Southern Cross Broadcasting network.

"We don't want to over-dramatize our reaction," Howard said.

Wednesday, September 06, 2006

Tattoo Generator.


Where do you want it? That's what the lady asks. Generate a tattoo and she'll show it, where you want it and how you want it. A wallpaper of your tattoo is also available. LINK

Replace Outlook With GMail As Your Default Email Program

This post has tips/instructions on how to make gmail as the default email client on your computer, how to send the current webpage or just a portion of it as a text email message and then there's a handy gmail shortcut to compose multiple emails without changing the gmail inbox view.

Microsoft Outlook, Thunderbird, Outlook express, or any other desktop email client can be easily configured to send and receive Gmail messages using POP3 access. However, these desktop email programs hog your computer memory and relatively take lot of time to start when compared to opening a standalone GMail compose message window from the browser.

Sometimes you just need to send a webpage link, forum registration verification email or a short snippet of the current webpage, it really doesn't make much sense to start Outlook for these tiny things.

To make GMail as your default email handler ?

Download either Google Talk or the Gmail Notifier [available both for Mac and Windows]. For Google talk, open the settings dialog and tick the checkbox next to the setting "Open Gmail when I click on email links". For Gmail notifier, right click the options menu and check the box next to Use Gmail for internet mailto: links.

Open GMail Compose Message Window Directly ?

Bookmark this link - This will directly open a new gmail message window bypassing the standard inbox view. Big time saver when gmail is taking lot of time to load on your computer.

Send text snippets or webpage URLs with GMail ?

Drag-n-drop this GmailThis! bookmarklet into your browser link bar.

Clicking this GMailthis link will open up a new gmail compose message window with subject as the title of your current webpage and the message body would be pre-populated with your gmail signature and any text selection that you have made on the current webpage.

GMail Compose message - Bonus Tip ?

Say you are in the middle of composing an gmail message but need to send another email to a friend at the same time. Either you could save the current message as a draft and then compose a new mail or a more efficient approach is to press Shift+C - it will open a compose dialog in a pop-up window.

If you have not enabled GMail keyboard shortcuts, press shift and click the "Compose new message" link on the top left corner. You might have to disable the pop-up blocker for gmail. A huge time saver.

GMail won't let me in.. | GMail HTML Signatures with Pictures | Deleting Mass Emails

Tuesday, September 05, 2006

List of Best Antivirus Software

I found this list of Best Antivirus Software via Digg that I thought I’d share.

Boat Suit

Very odd: Katrina rescuer is sued by boat owner.

A Broadmoor man who said he rescued more than 200 residents after commandeering a boat during the flood after Hurricane Katrina is being sued by the boat's owner for taking it "without receiving permission."

Mark Morice, who by the Wednesday after the storm said he "couldn't get more than a block or two without people screaming to me for help," took the boat "out of necessity. . . . I did it for my neighbors." ...

The lawsuit contends that boat owner John M. Lyons Jr. suffered his own distress, in the form of "grief, mental anguish, embarrassment and suffering . . . due to the removal of the boat," as well as its replacement costs.