- When you call a customer-service line, an automated voice often asks you to punch in your account information. So why does the live operator ask you for that information all over again?
- Why can't stores ever deliver an appliance or piece of furniture when they say they will? And why do I have to sit around all day waiting for them to show up?
- Why are public-address systems frequently inaudible? This isn't just a problem with antiquated speakers in subway stations. Brand-new sound systems in airports and other transportation hubs can also be impossible to hear.
- Why can't you buy a nonproprietary cellphone and use it with any carrier, the way you can do with a land line?
- How come banks immediately take money out of your account for debit- card transactions, but when it comes to depositing money it can take as long as five days for a check to clear and be posted to your account?
- Why do you have to pay for incoming and out- going minutes on cellphones? Essentially, a cellphone carrier is collecting twice for one call -- from the caller and from the person receiving the call. Shouldn't only outgoing calls cost money?
- Why do rental-car companies charge so much money to put gas in the tank, forcing travelers to drive around near airports looking for a normal gas station so they don't get gouged? Also, why is rental-car insurance so confusing? You already have insurance through your credit- card company or your own auto insurer, so why do they try to sell you double coverage?
- If companies are allowed to sell personal information about you to third-party marketers, even without your consent, why can't you just sell your own information directly to marketers?
- Why is mobile directory assistance so unreliable? It seems that when you call from your cellphone, they can never find the number you need.
- Why are items in hotel minibars so expensive? Do candy bars and bottles of water really have to cost $5? While we're at it, why do cheap and midprice hotels often provide wireless access free, while expensive hotels charge for it?
Wednesday, November 01, 2006
Customer Service Pet Peeves
Sunday, October 22, 2006
Lazy Sunday
It's raining a slow drizzle outside right now and the sun is no where in sight.
It's all I can do to keep my eyes open.
I think I'm going to throw a movie in the dvd player and lay on the couch.
Things will just have to wait some more.
Friday, October 20, 2006
113 run commands
access.cpl
Add Hardware Wizard
hdwwiz.cpl
Add/Remove Programs
appwiz.cpl
Administrative Tools
control admintools
Automatic Updates
wuaucpl.cpl
Bluetooth Transfer Wizard
fsquirt
Calculator
calc
Certificate Manager
certmgr.msc
Character Map
charmap
Check Disk Utility
chkdsk
Clipboard Viewer
clipbrd
Command Prompt
cmd
Component Services
dcomcnfg
Computer Management
compmgmt.msc
Date and Time Properties
timedate.cpl
DDE Shares
ddeshare
Device Manager
devmgmt.msc
Direct X Control Panel (If Installed)*
directx.cpl
Direct X Troubleshooter
dxdiag
Disk Cleanup Utility
cleanmgr
Disk Defragment
dfrg.msc
Disk Management
diskmgmt.msc
Disk Partition Manager
diskpart
Display Properties
control desktop
Display Properties
desk.cpl
Display Properties (w/Appearance Tab Preselected)
control color
Dr. Watson System Troubleshooting Utility
drwtsn32
Driver Verifier Utility
verifier
Event Viewer
eventvwr.msc
File Signature Verification Tool
sigverif
Findfast
findfast.cpl
Folders Properties
control folders
Fonts
control fonts
Fonts Folder
fonts
Free Cell Card Game
freecell
Game Controllers
joy.cpl
Group Policy Editor (XP Prof)
gpedit.msc
Hearts Card Game
mshearts
Iexpress Wizard
iexpress
Indexing Service
ciadv.msc
Internet Properties
inetcpl.cpl
IP Configuration (Display Connection Configuration) ipconfig /all
IP Configuration (Display DNS Cache Contents) ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents) ipconfig /flushdns
IP Configuration (Release All Connections) ipconfig /release
IP Configuration (Renew All Connections) ipconfig /renew
IP Configuration (Refreshes DHCP & Re-Registers DNS) ipconfig /registerdns
IP Configuration (Display DHCP Class ID) ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID) ipconfig /setclassid
Java Control Panel (If Installed)
jpicpl32.cpl
Java Control Panel (If Installed)
javaws
Keyboard Properties
control keyboard
Local Security Settings
secpol.msc
Local Users and Groups
lusrmgr.msc
Logs You Out Of Windows
logoff
Microsoft Chat
winchat
Minesweeper Game
winmine
Mouse Properties
control mouse
Mouse Properties
main.cpl
Network Connections
control netconnections
Network Connections
ncpa.cpl
Network Setup Wizard
netsetup.cpl
Notepad notepad
Nview Desktop Manager (If Installed)
nvtuicpl.cpl
Object Packager
packager
ODBC Data Source Administrator
odbccp32.cpl
On Screen Keyboard
osk
Opens AC3 Filter (If Installed)
ac3filter.cpl
Password Properties
password.cpl
Performance Monitor
perfmon.msc
Performance Monitor
perfmon
Phone and Modem Options
telephon.cpl
Power Configuration
powercfg.cpl
Printers and Faxes
control printers
Printers Folder
printers
Private Character Editor
eudcedit
Quicktime (If Installed)
QuickTime.cpl
Regional Settings
intl.cpl
Registry Editor
regedit
Registry Editor
regedit32
Remote Desktop mstsc
Removable Storage
ntmsmgr.msc
Removable Storage Operator Requests
ntmsoprq.msc
Resultant Set of Policy (XP Prof)
rsop.msc
Scanners and Cameras
sticpl.cpl
Scheduled Tasks
control schedtasks
Security Center
wscui.cpl
Services
services.msc
Shared Folders
fsmgmt.msc
Shuts Down Windows
shutdown
Sounds and Audio
mmsys.cpl
Spider Solitare Card Game
spider
SQL Client Configuration
cliconfg
System Configuration Editor
sysedit
System Configuration Utility
msconfig
System File Checker Utility (Scan Immediately) sfc /scannow
System File Checker Utility (Scan Once At Next Boot) sfc /scanonce
System File Checker Utility (Scan On Every Boot) sfc /scanboot
System File Checker Utility (Return to Default Setting) sfc /revert
System File Checker Utility (Purge File Cache) sfc /purgecache
System File Checker Utility (Set Cache Size to size x)
sfc /cachesize=x
System Properties
sysdm.cpl
Task Manager
taskmgr
Telnet Client
telnet
User Account Management
nusrmgr.cpl
Utility Manager
utilman
Windows Firewall
firewall.cpl
Windows Magnifier
magnify
Windows Management Infrastructure
wmimgmt.msc
Windows System Security Tool
syskey
Windows Update Launches
wupdmgr
Windows XP Tour Wizard
tourstart
Wordpad
write
Wednesday, October 11, 2006
Simple Paint
LINK
Kaleidoscope 1.5
LINK
pd-Halloween 4.0
LINK
Friday, October 06, 2006
Free Spell Checker 1.0
LINK
MB Divination Dictionary 1.0
LINK
Reminders 1.0
LINK
Wednesday, October 04, 2006
Password Revealer
Bring the password box on the screen, run Password Revealer, and click the button to reveal the password. That's all.
Mihov Picture Downloader 1.4
LINK
RapidCaps 2.1
LINK
Free Online Image Editor 1.0
LINK
Switcher 2.1
Link
Sunday, October 01, 2006
HTML TIDY 1.0
LINK
DHTML Sudoku 1.3
LINK
LockAnEXE 1.1
LINK
Vampeer 2.3
LINK
LockWorkstation 1.0
LINK
A.L.A.R.M. 1.0
LINK
Chainsaw 3.7
LINK
Agent Ransack 1.7
LINK
Thursday, September 28, 2006
MONITOR
Memory:
CPU:
MOTHERBOARD:
Hard Drive:
The Oldest Website
But did you know that the first website was created on march 15, 1985?
And from March 15, 1985 - August 5, 1986 there were only 20 website created. These 20 website were the only websites you can surf before.
Here are the 20 oldest websites:
Date Created Website
15-Mar-1985 symbolics.com
24-Apr-1985 bbn.com
24-May-1985 think.com
11-Jul-1985 mcc.com
30-Sep-1985 dec.com
07-Nov-1985 northrop.com
09-Jan-1986 xerox.com
17-Jan-1986 sri.com
03-Mar-1986 hp.com
05-Mar-1986 bellcore.com
19-Mar-1986 ibm.com
19-Mar-1986 sun.com
25-Mar-1986 intel.com
25-Mar-1986 ti.com
25-Apr-1986 att.com
08-May-1986 gmr.com
08-May-1986 tek.com
10-Jul-1986 fmc.com
10-Jul-1986 ub.com
New Browser To Leave You Without A Trace
The webserver is called "Torpark", it has no installation meaning it can directly be used from a usb drive. The Torpark creates an encrypted connection to the TOR (The Onion Router) network, which supplies a succession of different IP addresses.
"Torpark causes the IP address seen by the Web site to change every few minutes, to frustrate eavesdropping and mask the requesting source," Hacktivismo said in a statement.
When you use Torpark, it will show different ip address every a few minutes to the website your visiting. For example if you are in London, Torpark will show the website that your in Australia and a few minutes it will show that you are in China.
Torpark encrypts data sent to the TOR network, but data isn't encrypted between TOR and the destination Web site. Therefore, be sure not to use user name or password on Web sites that do not offer a secure login and session.
Torpark will cause your surfing slower than the unmodified browser. But this will surely help you to surf the internet without giving up your privacy.
Increase Internet Bandwidth
Because Windows XP seems want to reserve 20% of the bandwidth for its self. Even with QoS disabled, even when this item is disabled. So why not use it to your advantage.
This is for broad band connections.Make sure your logged on as "Administrator". Do not log on with any account that just has administrator privileges.
Click Start>run>type "gpedit.msc"
Expand the "local computer policy" branch
Click "Computer Configuration"
Expand the "administrative templates" branch
Expand the "network branch"
Highlight the "QoS Packet Scheduler" in left window
In right window double click the "limit reservable bandwidth" setting
On setting tab check the "enabled" item
Where it says "Bandwidth limit %" change it to read 0
Reboot if you want to but not necessary on some systems your all done. Effect is immediate on some systems. Some need re-boot.
Change the location of the My Music or My Pictures Folders
Open a My Computer window and navigate to the location where you'd like My Music (or MyPictures) to reside.
Then, open the My Documents folder in a different window. Drag the My Music
(or My Pictures) folder to the other window, and Windows XP will update all of the references to that folder to the new location, including the Start menu.
The Power Of F5
The F5 key is the refresh key. You can press F5 when viewing a Web page to make sure that you have the most current version of that Web page. Because blog is frequently updated by their author, make sure you are currently viewing the updated blog. By using the F5 key, you can refresh the blog and show you the current. This will help you if you frequently visit a blog in a day. And to prevent from being late to catch the newly post to your favorite blog.
Another use of F5 key is to refresh the Windows screen. This can be a handy shortcut. If perhaps you are viewing the contents of a floppy disk and you insert a new floppy, your screen will still show the contents of the first floppy. Just press F5 to refresh the screen and see the contents of the floppy you just inserted.
First Defense To Malicious Attack
-is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. (The term also implies the security policy that is used with the programs.) An enterprise with an intranet that allows its workers access to the wider Internet installs a firewall to prevent outsiders from accessing its own private data resources and for controlling what outside resources its own users have access to.
-it is a no brainer to surf the internet without a firewall installed in your computer. There are lots of freeware firewall out there, to name a few....visit http://hezroncomputerzone.awardspace.com
Keep Your Private Files Private
In Windows XP, right click wherever you want to put your compressed folder then choose New from the drop-down menu then select Compressed Folder (or winzip if installed). This will add a compressed folder with the default name New Compressed Folder, change it to whatever folder name you like. Now locate the file and/or folder you wand to protect and move it inside the compressed folder. (You can just copy your files but it will leave your original files unprotected.)
In the File menu of the compressed folder choose Add a Password then type your desired password in the dialog box then click ok.
After that, you have to enter the password everytime you want to access your private files, that makes your private files unaccessible to other user without your password.
Note: Keep a backup of your password protected compressed folder because compressed folder can't keep your files from being deleted.
Notepad Timestamp
Saturday, September 23, 2006
BASICdraw 1.0
What is a Prodedural Image Editor ?
A prodedural image editor lets you draw with coded instructions rather than with mouse commands. BASICdraw does include a couple of simple drawing tools, but the power of the editor lies in its ability to allow you to run arbitrary MiniBASIC scripts over images.
What is it good for ?
BASICdraw is good for all those jobs that are hard to achieve any other way, except with expensive software. For instance you want to rotate a logo and paste it into your front cover. Or you want to put a grid over the image. Or you need to add a border ten pixels wide. All very simple things to achieve in code, but hard to do with conventional editing software. Every graphics studio should have a copy.
Do you need to be a programmer ?
BASIC is the easiest programming language to learn. Millions of people who do not consider themselves to be professional programmers know how to use it. If you don't know BASIC already, it is very simple to pick up.
LINK
Notepad++ 3.8
LINK
Friday, September 22, 2006
70 Ways To Tell You've Been Online Too Long
2. Someone at work tells you a joke and you say "LOL".
3. You watch TV with the closed captioning turned on.
4. You have called out someone's screen name while making love to
your significant other.
5. You keep begging your friends to get an account so "we can hang out".
6. Three words: Carpal Tunnel Syndrome.
7. You've even gotten on an airplane just to meet some folks face-to-
face.
8. You have to get a 2d phone line just so you can call Pizza Hut.
9. You go into labor and you stop to type a special e-mail to let everyone
know you're going to be away.
10. You have a vanity car tag with your screen name on it.
11. You no longer type with proper capitalization, punctuation, or
complete sentences.
12. You have met over 100 AOLers.
13. You begin to say "heh heh heh" instead of laughing.
14. When someone says "What did you say?" you reply "Scroll up!"
15. You find yourself sneaking away to the computer in the middle of the
night when your spouse is asleep.
16. You turn down the lights & close the blinds so people won't know
you're on-line again.
17. You know more about your AOL friends' daily routines than you do
your own spouses.
18. You find yourself lying to others about your time on-line & when they
complain that your phone was busy you claim it was off the hook.
19. You have an identity crisis if someone is using a screen name close to
your own.
20. You would rather tell people that your bloodshot eyes are from
partying too much than the truth (online all night).
21. You change your screen names so much that you have to look at your
own profile to see who you are.
22. Your kids are standing at your side saying, "Mommy, please come and
cook" dinner and you would rather type another "LOL".
23. You type messages to people while you are on the phone with them at
the same time.
24. You won't work at a job that doesn't have a modem involved.
25. Your dog leaves you.
26. You have to ask what year it is.
27. You write a letter like this.. "dear tom, hiyas! how r u doin well I gotta
go bbl!"
28. You name your pets after people you talk to.
29. You smile sideways...
30. You sign on & immediately get 10 IMs from people who have you on
their buddy list.
31. You look at an annoying person off-line & wish you had your ignore
button handy.
32. You bring a bag lunch & a cooler to the computer.
33. Your significant other kisses your neck while you're chatting & you
think "uh oh cyber sex perv".
34. You have withdrawals if you are away from the computer for more
than a few hours.
35. You use AOL lingo in everyday life (if you still have one he he he).
36. You take a speed reading course to keep up with the scrolling.
37. Your buddy list has over 100 people on it.
38. Your worse comeback to a bully is "I'll slap ya w/a rubber chicken!"
39. You wake up in the morning and the first thing you do is get online
before you have your first cup of coffee.
40. You have to inject no-doze into your butt to keep it awake.
41. You have your computer set so it goes directly into AOL's welcome
screen.
42. You don't know where the time has gone.
43. You end sentences with 3 (or more) periods while writing letters by
hand.
44. You get up at 2am to go to the bathroom but turn on the computer
instead.
45. You don't even notice anymore when someone has a typo.
46. You enter a room & 23 people greet you w/((hugs)) or **kisses**.
47. You stop typing whole words and use things like ppl, dunno and
lemme.
48. Your voicemail/answering machine message is "BRB, leave your s/n &
I will TTYL".
49. You type faster than you think.
50. You got your psychiatrist addicted to AOL too & are now undergoing
therapy in private rooms instead of at his office.
51. You want to be buried with your computer when it dies or vice versa.
52. You actually enjoy the fact that you are addicted.
53. You can actually read & follow all the names of the cast that scrolls up
your TV screen at the end of a movie.
54. People say, "If it weren't for your super reflexes in your eyes &
fingers, you would have been classified as a vegetable!"
55. You dream in "text".
56. Being called a newbie.gif is a "MAJOR" insult.
57. There is absolutely no interesting chat in any room & you're really
bored.
58. You don't want to leave in case you miss something.
59. You double click your TV remote.
60. You can now type over 70wpm.
61. You think about starting a 12-step recovery group for AOL junkies.
62. You are on the phone a minute & need to do something else &
say "BRB" or "BBL".
63. You check your Email and forget you have real mail aka snail mail.
64. You go into withdrawals during dinner.
65. You spend at least 30 minutes making sure you say goodbye to
everyone in a room.
66. You stop speaking in full sentences.
67. You have gone into an unstaffed Tech Support room & ended
up "giving" tech support to other AOLers.
68. You have to be pried from your computer by the "Jaws of Life".
69. You know what a "snert" is.
70. You set your kitchen on fire while cooking dinner because you wanted
to check your mail" & while there you "just wanted to see who was
online".
Thursday, September 21, 2006
WordWeb 4.0
WORDWEB FREE VERSION
WordWeb is a free cut-down version of the WordWeb Pro software. It includes a comprehensive English thesaurus and dictionary, and can be used to look up words from within most programs. Features of the free version include:
Definitions and synonyms | 140 000 root words |
Millions of people from all over the world use this top-rated software.
PhraseExpress Autotext 3.0
LINK
Warning Sign Generator
Time to warn someone you know of imminent danger! Use this Warning Sign Generator to create a fake warning sign for all sorts of dangerous situations.
LINK
Tuesday, September 19, 2006
Proxy Generator
Make your own proxy with this free web proxy generator.
Use this at your own responsibility.
LINK
Insult Generator.
There are four insult styles to choose from: Modern, Shakespearean, Arabian and Mediterranean. Here are some examples:
You undisciplined sliver of wild belly-button fluff.
You lost eruption of hairy lizard droppings.
You congealed accumulation of fresh cooking fat.
May emergency medical technicians eat each other's belly-button fluff on your lawn.
LINK
Monday, September 18, 2006
Rare Snake Hides In Woman's Panties
NUREMBERG, Germany --A rare Filipino snake smuggled itself into Germany by hiding in a female tourist's panties. The green ring snake survived a long-distance flight and even a tumble in a washing machine.
The woman, 31, from Nuremberg, Germany, put her dirty undies in the machine after returning from a trip to the Philippines, but she only spotted the snake when she opened the door to take out the wash.
Now I can understand how a snake might of gotten there. How didn't she know it was there while wearing the panties? Something fishy here.
Saturday, September 16, 2006
Bruce's Unusual Typing Wizard 1.0
Friday, September 15, 2006
MovieCal 2.1
Note: unfortunately the entire website is in German but there is a 6.5 Mb PDF "ReadMe" download file in German & English that should provide all the info necessary! Both CNet's Download.com and Softpedia rate it as freeware plus Softpedia says the file is clean LINK
The Weather Man 1.0
Steps to Trouble-Free Computing 3/10
Tuneup Your Hard Disk Regularly | |
|
Every day, you create new files, delete unwanted ones, and write updated versions of current files to your computer's hard disk. Because of the way Windows and the Mac OS assign disk space to files, your hard disk can become fragmented over time (i.e., your files get placed in pieces all over the hard disk, because there is no contiguous space large enough to hold them). A fragmented hard disk slows disk access and makes it harder to recover from disk errors.
To defragment a Windows 95/98/ME/XP hard disk, use the Disk Defragmenter program in Programs/Accessories/System Tools. On a Mac, use a utility such as the Speed Disk tool that comes with Norton Utilities for the Macintosh. You should defrag your hard disk every six months. You should also defrag it after you have created or deleted a lot of files in a short span of time.
Occasionally, a storage area called a sector on your hard disk goes bad. A utility called a disk scanner detects such "hard" errors and keeps a table of such sectors so that your operating system doesn't try to use them to store files. In addition, a disk scanner detects "soft" errors, where the operating system has lost track of pieces of one or more files. ScanDisk (found in Programs/Accessories/System tools) is Windows 95/98/ME/XP built-in disk scanner, and it detects both hard and soft errors. On the Mac, you can use the Disk First Aid program that comes with your system or the more powerful Disk Doctor utility included in the ubiquitous Norton Utilities for Macintosh. You should run a hard disk scan at least every month. In addition, if your computer crashes or you accidentally shut down without going through the proper shutdown procedure, run a disk scan as soonThursday, September 14, 2006
Random Key 1.0
Harry's Filters 3.0
Harry's Filters is a Photoshop-compatible plug-in containing 69 different image effects that can be used with dozens of different image editing applications such as Photoshop, Paint Shop Pro, Gimp, IrfanView, XnView, and many others (full compatibility list on website). The main effect categories are called Color, Artistic, Gradients, Patterns, Warp, Noise, En/Decrypt and Other. Options for saving and opening effect presets, an animatable preview feature and a random effect button are included, too.
LINK
Water Ripples Plug-in 1.3
Water Ripples Plug-in is a freeware Adobe Photoshop compatible plug-in filter. The highly realistic water ripples effect designer has numerous options as well as an impressive 3D quality. The random settings generator produces unlimited variations of rippled surfaces.
LINK
YeahReader
YeahReader is a free program for reading news feeds in RSS, RDF and Atom formats, and podcasts.
The program provides all basic RSS reader functionality such as a convenient feed update system, proxy support and pop-up update notification. Besides this, YeahReader has such features as built-in blog client that will allow you to quickly write messages to your LiveJournal, Blogger, WordPress or Delicious blog, OPML support, ability to export data into HTML, CSV or JS format, multilanguage support and others. LInk
Wednesday, September 13, 2006
Contact Numbers 1.5
AutoHotkey
Vorbital Player Version 1
Download Vorbital Player Version 1
Vorbital is an Ogg Vorbis file player. It uses OpenAL and is small and compact in order to take up as little screen space as possible (though you can, of course, resize the window if you would like a larger playlist). The GUI was developed using wxWidgets.
The functions of most of the buttons are obvious, but just in case you can't tell at first glance the folder-shaped button on the left allows you to add a file to the playlist and the minus symbol allows you to remove a file from the playlist. Double-clicking on a file in the playlist will cause it to start playing.
If, for some reason, you have trouble getting audio to play using this program, you should install the OpenAL redistributable, which is available HERE (Creative Labs' site).
A few sample Ogg Vorbis files (shown in the playlist) are available at http://www.vorbis.com/music/
Tuesday, September 12, 2006
ShutdownXP Enforcer 6.3
• A very powerful tool to immediate Shutdown or Restart Windows 2000 and XP Operating Systems' based computers (the last chance before the Reset button).
• Use it only if you have serious reasons not to follow the ordinary Shutdown/Restart procedure (i.e. an application that refuses to close, a system freeze, etc.).
• It's a System Tray Application and uses a very small amount of resources when running.
• It gives you the ability to create a Shutdown and a Restart shortcuts on your Desktop for the occasion of a System's Tray failure. LINK
Nanny Shutdown v1.2
This tool will automatically shutdown your computer after consuming a predefined time credit a day.
LINK
What's the WinKey used for on the Windows keyboards?
- WinKey = Displays taskbar and Start Menu
- WinKey + E = Opens Explorer
- WinKey + F = Opens Find
- WinKey + R = Opens Run
- WinKey + D = Maximize/Minimize all windows
- WinKey + M = Minimize all windows
- WinKey + Pause = Opens System Resources
- WinKey + Tab = Flip between open application in the taskbar
- WinKey + CTRL + F = Finds a computer
- WinKey + Shift + M = Maximize all "WinKey + E" minimized windows
- WinKey + Break = Displays the System Properties sheet
How can I find sites that have links to my home page
To see a list of all the sites that have links to your home page, do the following:
- Copy the following text to the clipboard
+link:http://yoursite.com/ -url:http://yoursite.com/ - Link to Alta Vista
- Paste the text into the search box
- Replace "your.site" with your site's URL
- Click the Submit button
- Alta Vista will display a list of sites that have links to your home page
In Google, do this:
- Go to Google
- Type in the following (replacing your domain name where appropriate)
link:yoursite.com
- Click on Google Search and it will display sites linking to you.
How to Delete AOL Instant Messenger
AOL Instant Messenger is installed when you download and install Netscape Communicator (since Netscape is now owned by America Online). However, it can be VERY annoying since the little yellow "running man" icon will load every time your system is connected to the Internet.
Follow these instructions to rid your system of the AOL Instant Messenger:
If you simply would like to disable the Instant Messenger icon from activating do this:
Start AOL Instant Messenger (AIM).
Click on Setup.
Click the "Misc." tab.
Uncheck "Start Netscape AIM when Windows starts".
Click OK.
However, if you'd like to completely remove it from your system, you'll have to follow this more complicated procedure (BEWARE: this involves editing the registry - PLEASE do not do this if you are not comfortable with the Windows registry and are willing to accept the consequences if something goes wrong).
Remove AIM from Personal Bookmark folder as follows. In Netscape Navigator, go to the Communicator menu and click "Bookmarks". Click "Edit Bookmarks" and then select and delete the "Instant Message" reference.
Using the FIND command under the Start Menu, delete the file "launch.aim" from every user profile directory on your hard drive. You'll likely find it in c:\program files\netscape\users\yourname, where "yourname" is the name of your user profile.
Next, close all Netscape windows that you are currently running. In Windows Explorer, find the "AIM" folder, likely in c:\Program Files\Netscape\Communicator\Program\". Delete the AIM folder.
Run the program Regedit, by going to START/Run and type regedit. This will start the Registry Editor. Be careful, one wrong move will destroy the registry.
Click on Edit, then "Find" and type in "AIM" (no quotes). Delete all references to AIM that are found..
Now, exit Regedit and restart your computer.
Once the computer is restarted, you should be rid of the AOL Instant Messenger icon.
Steps to Trouble-Free Computing 2/10
Make an Emergency Boot Disk | |
|
On Windows XP, you can generally boot directly from the Windows XP CD-ROM, however in some cases you may still need a set of boot floppies. In this case, click one of the links below to download a program to create boot floppies for Windows XP Home or Windows XP Pro editions.
Windows XP Home Edition Boot Floppy Creator
Windows XP Pro Edition Boot Floopy Creator
Under Windows 3.1, you have to create the disk yourself. Go to the DOS prompt and enter the following commands. Be sure to have a blank floppy handy.
FORMAT /S A:
COPY C:\AUTOEXEC.BAT A:
COPY C:\CONFIG.SYS A:
COPY C:\WINDOWS\SYSTEM.INI A:
COPY C:\WINDOWS\WIN.INI A:
Now, if you can't boot from your hard disk, you will have a way to get your system started so you can deal with the problem.
For other Windows Operating Systems, visit Bootdisk.com to download a boot disk creator for your version of Windows or DOS.
Sunday, September 10, 2006
Sdrawkcab Klat (Talk Backwards).
Hey everybody wherever you are
They've got a new way of talking and it's
Gonna go far; you take the letters in the
Words, turn 'em around; say the last one
First and check out the sound, Talk Backwards
LINK
Bonzi Buddy Removal Instructions and Help
He's your interactive friend and traveling companion on the Internet! He walks, talks, sings, browses and searches the Internet with you. That's according to the website...he's also very annoying.
How to I Remove Bonzi Buddy?
BonziBUDDY is easily removed following these instructions:
1) First you need to close the Bonzi Buddy Program. Click on Bonzi and say "Goodbye" to close him. Next, Right-click on the dollar sign icon next to your clock and choose "Exit."
2) Now click on Start > Programs > BonziBUDDY > Uninstall BonziBUDDY Bargain Hunting Tool and allow the uninstall program to finish.
3) Go to Start > Programs > BonziBUDDY > Uninstall BonziBUDDY and allow the uninstall program to complete.
4) Finally, restart your computer.
Sometimes the uninstall is not successful because a manual removal was tried previously, or a key file was deleted that the uninstall process needs. In these cases, reinstall the Bonzi Buddy software and then proceed with a normal uninstall shown above.
There is no need to delete any files first. All you need to do is visit
http://www.bonzi.com/bonzibuddy/bonzibuddyfreehom.asp
and download the BonziBUDDY files again. This will be a fast process if you already have most of the files installed, since the install will only download and install the files you don't have or ones that have been updated since your last download or update.
Once you have successfully run the install of BonziBUDDY again, just follow the instructions in #1 above to uninstall BonziBUDDY.
Clean up after Uninstalling
When BonziBUDDY is uninstalled, there are a few small files left in your BonziBUDDY directory that will remind Bonzi what your settings and preferences are should you ever decide to install him again. They are very small and will not harm your computer in any way, but it is safe to delete this folder if BonziBUDDY is already removed from your system.
Steps to Trouble-Free Computing 1/10
Step 1: Know Your System
The first preventive step you need to perform is to take an inventory of your computer system. This information will be vital if you later have to contact technical support or have your system serviced.Start by noting your serial number and model number. With this information, your system manufacturer can determine the components of your system. If you've added components to your system, note the model and version numbers of the components. You'll find this information in the documentation that accompanies add-on hardware.
A definite must-have program to complete a system inventory is Belarc Advisor, a free program showing a detailed profile of your installed software and hardware, missing Microsoft hotfixes, anti-virus status, CIS (Center for Internet Security) benchmarks, and displays the results in your Web browser.
Beyond these basics, you need to get details of your system's configuration. On Windows PCs, this means copying and printing a few important system files that will come in handy if you later have a problem or need to speak to a tech-support person. The simplest way to preserve your system configuration files is to run the Sysedit program. With Windows 95/98/ME, click on Start, RUN, type SYSEDIT in the blank window, and click OK. It will bring up all your system files -- from AUTOEXEC.BAT to SYSTEM.INI -- in Wordpad windows. From there, you can save them to a floppy disk and print them out. In Windows 3.1, you'll find the Sysedit icon in the Main group. With Windows XP/2000, you can go into Accessories, System Tools, System Information to find and print this important data.
If you own a Mac, you don't need to copy system files, but you should make a list of all the INIT and CDEV files -- collectively called system extensions -- that load on start-up. Conflicts among these files are a common source of program crashes on Macs. You can see a list of these files using the Extensions Manager Control Panel, which also lets you turn off one or more extensions so that, by process of elimination, you can identify which one is causing you problems. One limitation of Extensions Manager is that it doesn't let you print a list of extensions. If you want a list, you have to print the Screen.
Is It A Virus or a Hoax?
Hoaxes become viruses simply by individuals forwarding the hoax across the Internet to other unsuspecting individuals, these individuals read the warning and forward it on to still more people. Thus the "virus" spreads throughout the Internet.
The next time you receive an email warning of potential hazard to your computer if you open an email. Go check out the following webpages in particular to see if there is any truth to the message. An email may in fact contain a virus, but please check out the following pages to verify its authenticity before forwarding it on to someone.
The first place to visit to determine if something is a hoax or not is the
U.S. Department of Energy's Computer Incident Advisory Capability
Hoaxes described on this page: PKZ300, Irina, Good Times, Good Times Spoof, Deeyenda, Ghost PENPAL GREETINGS!, Make Money Fast, NaughtyRobot, AOL4FREE, Join the Crew, Death Ray, AOL V4.0 Cookie, A.I.D.S. Hoax, Internet Cleanup Day, Bill Gates Hoax, WIN A HOLIDAY, AOL Riot June 1, 1998, E-mail or get a Virus, Bud Frogs Screen Saver, Disney Giveaway Hoax.
Another place to visit is
If the email or file is listed on one of these two pages, it's probably a myth. If it is, please don't forward it to anyone. Internet chain letters just clog the Internet, slowing it down for everyone.
Also, most of the Anti-Virus companies have pages dealing with hoaxes, click on the links below to visit them.
JDBGMGR.EXE Hoax and how to recover file
How to Delete Undeletable Files in Windows
Cannot delete file: Access is denied
There has been a sharing violation.
The source or destination file may be in use.
The file is in use by another program or user.
Make sure the disk is not full or write-protected and that the file is not currently in use.
So if the file is in use, how do you delete it?
I'll show you several ways of removing these types of files and even some freeware programs that help you remove these pesky undeletable files.
Windows 95/98/ME
If you are using Windows 95, 98, or Windows ME, the easiest way to remove an undeleteable file is to boot to a DOS prompt and manually delete the file. Before you do this, you'll want to make a note of the location of the file including the entire path to it. Follow the steps below to delete these types of files.
If you already know the path to the file, please skip to Step 7- Click on Start, Find, Files and Folders
- Type the name of the undeletable file in the Named or Search For box
- Make sure the Look In box shows the correct drive letter
- Click on Find Now or Search Now and let the computer find the file
- Once the file is located, right-click on it and choose properties, make a note of the file location. Usually this is something similar to
c:\windows\system32\undeleteablefilesname.exe
- Close the search box
- Locate a boot disk for your version of Windows, if you do not have a boot disk, follow the steps on the link below to create an emergency boot disk.
How to Create an Emergency Boot Disk for Windows
- Shut down and restart your computer with the boot disk in your floppy drive.
- The computer will boot to a DOS prompt that will look similar to
c:\
- Type the following command and press Enter to delete the filer, substituting the phrase
with the actual path and file name you discovered in Step 5 above.
del
Example:
del c:\windows\undeleteablefile.exe
- Remove the boot disk in the floppy drive and restart your computer
- The file should now be deleted.
Windows XP
In Windows XP, there are a couple ways to remove an undeleteable file, a manual way, and a couple automated ways using some freeware programs. First, I'll show you the manual way.Manual Method
If you already know the path to the file, please skip to Step 7
- Click on Start, Search, All Files and Folders
- Type the name of the undeletable file in the box shown
- Make sure the Look In box shows the correct drive letter
- Click Search and let the computer find the file
- Once the file is located, right-click on it and choose properties, make a note of the file location. Usually this is something similar to
c:\windows\system32\undeleteablefilesname.exe
- Close the search box
- Click on Start, Run, and type CMD and Press Enter to open a Command Prompt window
- Leave the Command Prompt window open, but proceed to close all other open programs
- Click on Start, Run and type TASKMGR.EXE and press Enter to start Task Manager
- Click on the Processes tab, click on the process named Explorer.exe and click on End Process.
- Minimize Task Manager but leave it open
- Go back to the Command Prompt window and change to the directory where the file is located. To do this, use the CD command. You can follow the example below.
Example: to change to the Windows\System32 directory you would enter the following command and Press Enter
cd \windows\system32
- Now use the DEL command to delete the offending file. Type DEL
where is the file you wish to delete.
Example: del undeletable.exe
- Use ALT-TAB to go back to Task Manager
- In Task Manager, click File, New Task and enter EXPLORER.EXE to restart the Windows shell.
- Close Task Manager
Remove on Reboot Shell Extension
N.Y. Woman Wins $1 Million Lottery Again
NEW YORK - A woman who won $1 million from a state lottery game four years ago has improbably hit the jackpot again.
Valerie Wilson, who works at a Long Island deli, said she won another $1 million on a lottery scratch-off game last month.
"The first time I couldn't believe it," Wilson told Newsday. "This time I said, 'God's on my side.'"
Wilson, 56, beat some long odds to pull off her double victory.
In 2002, her winning ticket in the Cool Million scratch-off game, which has since been discontinued, was a shot of 1 in 5.2 million, according to the New York State Lottery. Last month, she beat odds of 1 in 705,600 when she got the $1 million prize in the New York lottery's Jubilee scratch-off game.
Overall, her chances of winning both games were a slim 1 in 3,669,120,000,000.
A lottery spokeswoman verified Wilson was a Cool Million winner in 2002, but declined to confirm her latest win until a planned news conference. There have been only two previous repeat million-dollar-plus winners in the lottery's history, according to the state.
Wilson still hasn't quit her job at Emma's Deli and Catering. Despite her unexpected bonus, Wilson plans to keep working until at least December, making sandwiches and ringing up sales.
The prize will be paid out in $50,000 installments over 20 years. Wilson said she used her first winnings to help buy homes for her three children.
"This one is going to be for me," she said. "I'm going to live a little bit."
Saturday, September 09, 2006
Celebrity Tanning Secrets
The secret's out: Mariah Carey's golden tan line.
Mariah Carey is developing a new fake tan made with 24-karat gold dust.
The singer is insisting she is beautifully bronzed on every night on her current 'Emancipation of Mimi' tour and has hired a personal tanning assistant, Jenny Phillips, to spay her before going on stage.
I wonder how many people in the world are employed as a personal tanning assistant?
In the past, Mariah has paid for her Jack Russell dog - named Jack - to fly first class, refused to walk up or down stairs, requested a red carpet be rolled out for her arrival at a London hotel and reportedly demanded toffee.
You Must Be Baptized To Ride This Bus
In the UK: Free travel denied to schoolgirl.
An 11-year-old girl starting at a new school has been denied transport by coach because she is not baptised.
Hertfordshire County Council claims the transport requirement was explained to her parents before they sent her to a Church of England school in St Albans. Sydnie Jai lives with her mother Frances Wood at Hatfield - a journey of about eight miles to the school.
Mrs Wood said Sydnie is too young to consider baptism and she felt she was being discriminated against.
A school spokesperson defended the decision:
"We think it quite reasonable when offering transport to faith schools that parents show that the child is of that faith.
And what better way to show that a child is faithful than by dunking the kid's head in water?
Snake Goes From Weapon to Wounded
NEW YORK - Snake's alive! A boa constrictor was recovering Friday at a Manhattan animal shelter, one day after it was injured by a man who was waving the six-foot snake at passers-by on a Brooklyn street, authorities said.
"The boa is resting, healing, and our medical technicians are keeping an eye on it," said Richard Gentles, spokesman for the Manhattan Animal Care Center. The snake was brought to the facility on Thursday with an injury to its lower jaw, reportedly when the man stabbed the boa with scissors.
Center authorities planned to transfer the snake to a permanent home outside of New York City, where the creatures are illegal, Gentles said. A licensed wildlife rehabilitator will take custody of the wounded snake.
"Sometimes they go to zoos, sometimes to sanctuaries, and sometimes they're used for educational purposes," he said.
Woman in Wheelchair Shoots Alleged Mugger
NEW YORK - Margaret Johnson's wheelchair might have made her look like an easy target. But when a mugger tried to grab a chain off her neck Friday, the 56-year-old pulled out her licensed .357 pistol and shot him, police said.
Johnson said she was in Harlem on her way to a shooting range when the man, identified by police as 45-year-old Deron Johnson, came up from behind and went for the chain.
"There's not much to it," she said in a brief interview. "Somebody tried to mug me, and I shot him."
Deron Johnson was taken to Harlem Hospital with a single bullet wound in the elbow, police said. He faces a robbery charge, said Lt. John Grimpel, a police spokesman.
Margaret Johnson, who lives in Harlem, has a permit for the weapon and does not face charges, Grimpel said. She also was taken to the hospital with minor injuries and later released.
Trio Accused of Gunpoint Prayer Session
ATHENS, Ala. - A woman and two roommates are accused of holding her brother at gunpoint as she prayed for his repentance, even firing a shot into the ceiling to keep his attention.
Randy Doss, 46, of Athens said he fled the house when his captors got distracted and later went to police, who were skeptical at first because his story was so bizarre. But police said it checked out, including the bullet hole in the ceiling.
"We found where they patched the hole with caulk," said Sgt. Trevor Harris.
Police said the sister, Tammie Lee Doss, 43, Donna Leigh Bianca, 37, and Ronald David Richie, 45, who live at the Athens house, were charged with unlawful imprisonment, a misdemeanor. The two women were also charged with menacing, a misdemeanor. All were released on bond.
Harris said Randy Doss went to the house about 7 p.m. on Labor Day and at some point got in an argument with the two women about religion. When they prayed for him, he laughed.
"They both got upset and pointed pistols at him," Harris said. "They wouldn't let him leave. Bianca fired one round in the ceiling in the hallway a few feet from the victim's head."
Harris said the women tried to get Doss to admit things he did as a child.
"She claims the brother wronged her years ago when they were kids and she just got the truth out of him and apparently wanted revenge," said Harris. "He says they would not let him go. The sister says she was just trying to scare her brother."
The three suspects denied they held Doss against his will.
"The door was never locked and he could have walked out that door any time he wanted to," the sister told the News-Courier of Athens. "We never held him against his will."
Harris said Richie did not have a weapon but is accused of blocking the door to keep Doss from fleeing.
Doss said he escaped the house about 1 a.m. Tuesday.
"We don't know if they were just playing games, but it is ridiculous for men and women in their 40s to be playing games like this," Harris said.