Friday, December 31, 2010

Double your profit in 30 days: Start small, get big

There are lots of ways to earn online, but most of them are tedious & hard working. Also there are lots of scams that offer huge profit in no time that end up into stealing your money. BUT you are desired to make profit from online resources and surely you can do this. There is no magic nor any MLM techniques but still you can do so. Be with me to the last word of this blog.

Since I started surfing online, experienced numerous money making resources and techniques but only few of them were trustworthy. Based on my long way experiences, I decided to make a very easy course for everybody to earn online with minimum hazards. And finally I made it.

This course will teach you 'how to act to double your profit in only 30 days'! That seems to be crazy but its not joke. This course will explain all details in 5 steps. You hardly need 10-15 minutes to understand the procedure. At the end of the course, I have introduced a tutorial that will explain how you can get quick results in minmum time without try-catch sequence.
And the course will cost you only $25!!!
The amount is unbelievably small and anybody can afford to purchase the course & make his own fortune.

Let me try to read your minds and answer possible queries:

1. What is the course about? Is it affiliate/marketing/adsense/forex/selling/inventory?
A: No, its completely different.

2. How much time I need to understand the process?
A: 10-15 minutes depending on your reading ability.

3. Is it difficult to cope with?
A: No, its extremely easy. And anybody can do it, students, working moms, employees..

4. How much effort I have to make to succeed?
A: You need to spend only 5-10 minutes a day. And there's no more effort.

5. How much I can earn?
A: You can multiply your earnings in less than 30 days. If you plan to earn $100 then you will make $200, if you plan for $1000 then it will be $2000. No extra work is needed, its completely part-time job.

6. How much the course will cost me?
A: Only $25, one-time charge.

7. How can I contact you if I need to know more?
A: Contact me anytime,

Enjoy your earning freedom.

Monday, December 27, 2010

Tour from Rangamati & Chittagong

Recently I had a queer trip from Rangamati and Chittagong. We were there for 4 days (one day extended due to strike). Rangamati is the most beautiful & amazing to keep eyes stuck. My travel to this zone is the first time, also beheld hills & mountains this time. I was really excited to ride on 'Shuvlong' hill at the side of the Shuvlong falls. I'll soon upload all the images and share my experience about the tour.

Monday, December 6, 2010

Eye-catching lighting

I've seen lightings in numerous shapes & numerous styles. But these lightings are sure to lash your eye-balls.

Lights on Bentonville's downtown square as seen from the Benton County Courthouse.

Thursday, November 25, 2010

HostGator Black Friday Promotion - 80% discount for 24 hours for all hosting plans

Raise your hosting attitude with hostgator to the next level. The no#1 web hosting company in the world, launched crazy promotion for friday as 'black friday' facilitating users to get all sort of hosting plans for extreme low price.

This offer starts at 0:00 AM CST (-6 GMT) on friday and ends at 11:59 PM on the same day. The promotion is available for only 24 hours.

Get hooked with the time as there are some limits:
1) 5AM - 9AM CST -- 80% discount! That would come out to $35.64 for 3 FULL YEARS!
Shared Hosting – $4.95/month AS LOW AS $0.99/month

Reseller Hosting – $24.95/month AS LOW AS $4.99/month

VPS Hosting – $19.95/month AS LOW AS $3.99 First Month

Dedicated Servers – $174/month AS LOW AS $34.80 First Month

2) 0AM - 5AM CST -- 50% discount on all hosting plans

3) 9AM - 11:59PM CST -- 50% discount.

So, hurry up. Tune up at 5AM - 9AM CST (-6 GMT) and enjoy your hosting experience with world no-1 hosting company in the world. Signup here.

Friday, November 5, 2010

Wall Street Journal probe finds Facebook apps reveal user info

The Wall Street Journal investigated the privacy of Facebook users, finding that popular applications, such as FarmVille, send a user's personal information to marketing companies in a violation of Facebook privacy rules.
The Wall Street Journal published its findings Monday in a reveal exposing how marketers collect data about consumers -- when those same consumers are not aware their data is being "grabbed." More than one of the companies receiving personal information about users was selling that data, said Wall Street journalists Emily Steel and Geoffrey A. Fowler.

Steel and Fowler said they became interested in seeing if a user's personal information really was protected earlier this month after

"... Facebook created a control panel that lets users see which apps are accessing which categories of information about them."

Facebook, along with at least one of the companies that had received personal data, as well as a few bloggers have downplayed the privacy breach, saying the Wall Street Journal "over-reacted." The breach, they say, is not new, does not represent a conspiracy, and isn't something to worry about. Forbes blogger, Kashmir Hill wrote that the "breach" was nothing more than a design flaw, pointing out that My Space has the same issue. Hill thought the Wall Street Journal was unfairly singling out Facebook.

The Washington Post's Rob Pegoraro also had a similar analysis to Hill's. There's nothing new to the information Facebook reveals, Pegoraro said, while asserting that the information that is commonly revealed about Facebook users every day, even when those users opt for maximum privacy, is not private information.

In a statement posted Sunday on Facebook's Developer Blog, representative Mike Vernal wrote

"... Recently, it has come to our attention that several applications built on Facebook Platform were passing the User ID (UID), an identifier that we use within our APIs, in a manner that violated this policy. In most cases, developers did not intend to pass this information, but did so because of the technical details of how browsers work.
Press reports have exaggerated the implications of sharing a UID. Knowledge of a UID does not enable anyone to access private user information without explicit user consent. Nevertheless, we are committed to ensuring that even the inadvertent passing of UIDs is prevented and all applications are in compliance with our policy.
We have experience addressing this sort of issue previously, although the technical challenges here are greater. We are talking with our key partners and the broader Web community about possible solutions. We will have more details over the course of the next few days."

The Wall Street Journal reported that Facebook had shut down some applications over the weekend in response to the probe, but said some applications have since been reinstated on Facebook.

Steel and Fowler assert some of the data gathered from the ten top Facebook applications was sold to other companies. Approximately 500 million Facebook users use Facebook applications. The report also states that at least three of the applications not only sent out info on the user, but also sent out information about the user's friends.
One of those companies, RapLeaf Inc. issued a statement in response to the Wall Street Journal stating

"... When we discovered that Facebook ids were being passed to ad networks by applications that we work with, we immediately researched the cause and implemented a solution to cease the transmissions. As of last week, no Facebook ids are being transmitted to ad networks in conjunction with the use of any Rapleaf service. The transmissions, when they occurred, were not a result of any purposefully engineered process by Rapleaf. Instead, they were due to broader issues — as discussed in the article — concerning site referrer URLs, which are managed by sites themselves and ad networks."

The Wall Street Journal exposed a similar situation earlier this year where a user's private information was sent to advertisers when users clicked on Facebook ads, prompting Facebook to correct what it called an "unintentional oversight." At the time, Facebook said

"... in a rarely occurring case, advertisers knowledgeable about the structure of Facebook's URLs could use the referrer to determine when someone who clicked on an ad had been viewing his or her own profile, thus potentially enabling them to infer the user ID of that person. We have no reason to believe that any advertisers were exploiting this, and doing so would have been a violation of our terms. To our knowledge, none did."

For those wishing to learn more about how they can protect their privacy on Facebook, the Huffington Post has published three tips.
The addition of new privacy concerns for users of Facebook come just as Facebook has created a new application for Facebook users with Bing. The partnership means on-line Facebook searches will be "more personal," reported Network World.

Facebook's privacy policies have received strong criticism in the past, causing Facebook to revise options in an attempt to protect user's identifies and privacy. In September, Canada's Privacy Commissioner said she had completed a review of Facebook's privacy concerns, stating in a press release that Facebook had resolved the issues. However, Jennifer Stoddart said she still had concerns with Facebook, saying

"... However, our work with Facebook is not over."

The National Post reported Monday that Stoddart was considering launching another investigation into Facebook's privacy following Wall Street Journal's report.
Techland has posted an article that outlines the user identity issue in greater depth, using plain English.

Mother kills baby for interrupting 'Farmville' game

A 22 year-old woman from Jacksonville, Florida has pleaded guilty to killing her baby son over a game of Farmville. She was charged with second-degree murder after allegedly shaking the baby to death when he disrupted her gaming experience.
Alexandra V. Tobias says her three-month old child, Dylan Lee Edmondson, had been crying while she was trying to play the popular Facebook casual game called Farmville.
This angered Tobias, who told authorities that she shook the baby, had a cigarette to calm herself down, then shook him again. It's believed he "may have hit his head during the shaking".

Farmville is a popular game on Facebook where users control a virtual farm.
Tobias entered her plea Wednesday, the Huffington Post reports, before Circuit Judge Adrian G. Soud. A second-degree murder charge is punishable by up to life in prison, according a report in the Florida Times-Union.
Prosecutor Richard Mantei said Tobias' sentence could be less because of state guidelines that call for 25 to 50 years. Soud offered no promises on what he'll order during a sentencing hearing scheduled for December.
Outside the courtroom, Prosecutor Mantei said Tobias' plea will help avoid the family reliving the tragedy during a jury trial

Comments shared on gaming forums, like, have expressed outrage and condemned the woman's action. Gamers across the country have called for swift punishment for such a senseless murder.

Monday, October 11, 2010

My first WAP surfing :: The pros and cons of Opera Mini

Usually I'm addicted to 'web' version not 'wap'. I'm using internet through mobile operators for more than a year, but never used wap on my mobile. I used 'edge modem' to cope with connection dilemma. In this sense, I'm little boring, used internet through mobile SIM but didn't use the mobile SET!! Huh ha...

Anyway, finally I browsed internet through my mobile set. Although it happened due to my extreme need. I went to my hometown 'Jessore' for the holy Eid festival. I took my old laptop that I always use to do, but a terrible thing happened. Suddenly my laptop cracked!

There's no alternative to use phone to browse internet as I had contract with several clients and need to interact with them. So, I started my mobile internet browsing... You know I always hate slow usage either computer or laptop. I was delighted to surf therough Web from my handy Nokia set, but the surfing is not that enjoyable! I almost knocked off by the slow & tedious typing & low support for WAP culture. However, time erased the annoying tendency. I began to enjoy Wap browsing.

Then, I installed 'Opera mini' and experienced its tricky performance. Usually a website kills 150-300 KB on an average, while Opera mini compress the site apperance to only 5-10 KB. Very large websites may kill more bandwidth, like ebay takes 150-180 KB for opera mini while it takes 800-1400 KB in web surfing. I enjoyed this feature very much.

But Wap surfing has several significant limitations. It is unable to support many necessary features extremely needed in real life. I found the problems as:
- It can't copy url from particular site. Its needed to bookmark for further usage or make reference (like twitter).
- It can't copy particular text from a website. If you visit some websites and find very useful content, you want to copy it. But with wap, you simply can't make it.
- It doesn't allow url shortening (extremely necessary for twitter posts).
- It can't utilize 'right mouse' features.

Despite these drawbacks, wap browsing is really awesome. If you didn't enjoy it, it your turn.

Monday, August 30, 2010

3 impressive shots can make you smile

What is the best idea to refresh your mind?
Smile, smile and smile.... lol..
While surfing through web I found some amazing photos taken by amateur photographers. Among the pics, three shots impressed me a lot and made me think how amazing they are!

1. Flying camel(!) seeks last minute chat:

2. The beauty of animals - Sweet dog kisses tiny cat:

3. Attractive walkway for all kinds:

How to draw picture

To draw picture is surely requires artistic skills as well as clear vision & paradox. The following images are an example of power of arts:

Phase 1:

Phase 2:

Friday, August 27, 2010

Guess Who Is Trying To Trademark The Word “Face”? (And Guess Who Is Trying To Stop It?)

When it comes to trademarks, Facebook is proving to be a bully. It is going after Teachbook in court for using a similar name, and already forced Placebook to change its name. But that is only half the story.

It is not just the word “book” at the end of a company or product name that Facebook might object to. If it has its way, the word “Face” at the beginning of a name might also bring out its lawyers. In fact, Facebook is currently trying to register the word “Face” as a trademark. (It already owns the trademark on “Facebook”). Facebook took over the trademark application for “Face” from a company in the UK called CIS Internet Limited, which operated a site called Presumably, Facebook bought the application sometime around November, 2008, which is when its lawyer started dealing with the USPTO.

However, at least one person is objecting to this trademark: Aaron Greenspan. Yup, that Aaron Greenspan, Mark Zuckerberg’s classmate at Harvard who laid a claim to helping create Facebook, which he later settled. Greenspan now has his own company, Think Computer, which is behind the mobile payments app called FaceCash (watch the TCTV interview with him).

If Facebook gets the trademark for the word “Face,” that could spell trouble for FaceCash. “The possible registration has implications for my company (not to mention hundreds of others, including Apple, Inc.), so I’ve decided to ask the USPTO for an extension of time to oppose it,” he explains in an email. Apple, of course, owns the trademark to “Facetime,” the video calling feature on the latest iPhones.

Although Greenspan owns the trademark to “FaceCash”, he wants to protect his ability to use the word “face” in future products. He also wants to make sure Facebook won’t go after him. Given it’s track record of vigorously defending its trademarks (which it is encouraged to do by the law or else risk losing them), that could become a very real possibility.

Getting an extension of time to file an objection is not the same as actually blocking the trademark. But “face” is a pretty generic word and Facebook doesn’t actually use it on its own, only in combination with “book.” If Facebook doesn’t get “face,” maybe it will have better luck with “like.” It has at least 14 applications to trademark that word as well.

This post is taken from TechCrunch.

Monday, August 9, 2010

Earn your living working from home

Since the evolve of Internet, the job scope has been changed a lot. Now-a-days one doesn't need to rush to office, work hard from 9am to 5 pm, then trap into large traffic jam and back home. At the end of month he earn tedious monthly income.

But that days are gone. Job is now available anywhere, to get a profitable job you need an internet connection. There are dozens of ways to get quality jobs without risking your daily life. You may choose your career either part time or full time.

Freelance jobs made life easy. It helps both freelancers & buyers to choose the best personnel for their business at flexible price. Freelancers are free to choose one of 80-90 job types available on freelance job sites. And buyers can get quality service at affordable cost.

Learn more about freelance job sites.

Chimbuk hill calls for your visit

I heard about Chimbuk hill since my childhood. Chimbuk hill is in Banderban district in Bangladesh. I knew that this hill is a famous for its beauty, exciting attractions, clouds calls and thrills. The following images will make you feel the call from the heart of Chimbuk!

Monday, June 28, 2010

Create your website in 2 minutes with website builder

To start a new website is a complex task for most people either personal or business personnel. It needs a lot of work to create a powerful niche website & clear understanding of the detailed procedure. Everybody wants a quick & reliable solution to this dilemma. Why not pushing the disaster into waste tub? 

Let's consider the requirements for a successful website. What do you need to create a powerful niche website to stand out in the crowd? A niche website needs the following components:
- Attractive logo
- Impressive banner consisting a message
- Strong page layout, two or three columns layouts are preferred
- Advanced graphics and 3D effect to stand out
- Correlated images to enhance site navigation
- Quick navigation, links should be gained with one or two mouse clicks

It needs a lot of efforts and hard work to create a powerful website. Three ways you can cope with this dilemma:
1. Design your website by renowned developer companies.
2. Purchase attractive templates from template directories and shape it at your own.
3. Employ a freelancer designer to design your website.

All three choices would cost you a lot. If you want to purchase a package or customize package from a renowned company, they will charge you several thousands dollars.And an expert freelancer will charge you several hundreds bucks to design an attractive niche website.

However, a website builder can cope with this dilemma allowing you to create a stunning website with a few mouse clicks. No longer you have to learn about website design nor you need any prior knowledge about web design & programming. You can create your own niche website with free website in less than 2 minutes! What are waiting for? Build your website for free now.

Monday, June 14, 2010

Top 10 Enterprise Security Risks

Network administrators are besieged today with a growing list of security risks, and analysts warn that too often they get caught up in battling one or two vulnerabilities and remain blind to a league of others.

Security officers have been battling worms, viruses, denial of service attacks and hackers for years now. When you add the threat of cyber-terrorism, employees using Instant Messengers and downloading full-length feature movies onto their work PCs, the list of risks is multiplying far faster than security budgets or staffs can keep pace.

SilentRunner has created a Top 10 list of risk factors that security administrators should guard against. Here's what has made their short list of vulnerabilities:

1. Email Attachments -- Workers opening an attachment could unleash a worm or virus onto the corporate network, and a new evolution of viruses means that they can propagate themselves even without a user double-clicking on them;
2. VPN Tunnel Vulnerabilities -- A hacker who worms his way into the VPN has free and easy access to the network;
3. Blended Attacks -- Worms and viruses are becoming more complicated, and now a single one may be able to execute itself or even attack more than one platform;
4. Diversionary Tactics -- Hackers may strike a set of servers in a target company and then when security administrators are busy putting out that fire, they slip in and attack another part of the network;
5. Downloads from Web Sites -- Workers frequently misuse their Internet access in the workplace, downloading games, movies and music and even porn. It opens the network up to attack and sucks up valuable bandwidth;
6. Supply Chain and Partners Added to the Network -- An administrator may grant access to the network for a partner company and then forget to close that access point when the job is over. The same applies to employees who are leaving the company;
7. Microsoft's SOAP -- The Simple Object Access Protocol (SOAP) doesn't have security specifications built into it, warns Silent Runner's Woolley;
8. Renaming Documents -- An employee could save business-critical information in a different file, give it a random, unrelated name and email the information to her home computer, a friend or even a corporate competitor. Monitoring software that checks emails leaving the company might fail to pick up on the outgoing message if the subject name has been changed;
9. Peer-to-Peer Applications -- In a peer-to-peer environment there is an implied trust between servers. That means if a user has access to one server, he automatically has access to another if the servers share trust. Woolley points out that hackers or rogue employees can gain access to one server and move freely throughout the network;
10. Music and Video Browsers -- These are browsers that automatically will connect the user with related web sites -- all without the user's permission. A music browser, for instance, may note that the user likes jazz so will connect the user to other jazz sites and executable applications, putting the network at risk and potentially using up huge amounts of bandwidth.

Friday, June 4, 2010

Miss USA 2010 - Rima Fakih is a muslim girl (Lebanon)

Rima Fakih crowned Miss USA 2010 beauty pagent. The breath taking beauty achieved her title after long funny & ugly scandals of the corresponding beauty contest. Rima Fakih is a muslim girl, she originated from a muslim family and she herself is a muslim. Rima's family is originated from Lebanon (called as land of beauty in Middle east). The beauty, grace, perfect figure, extra-ordinary talent & killing smile made her perfect crown holder. Despite of very low score (8.3) in swimsuit category, she achieved her deserved role.

Miss USA 2010 beauty contest is burdened with ugly competition. First the crown went to Miss California, but her ugly promotion snatched her title. She exposed her body like a playmate, took several shots that are available only on Playboy magazines. After receiving her title, her ugly promotion materials were disclosed and the jury board decided to snatch away her title. Then they selected Miss Michigan 'Rima Fakih' as the winner of Miss USA 2010 beauty contest.

Stunning images of Rima Fakih:

Photo Personals at!

Tuesday, June 1, 2010

Some stunning photoshop works

Its my hobby to surf through web and find something interesting. Of them, I prefer Flickr most, to find attractive images either natural or artistic. I found some images that are edit with photoshop to give stunning look.

Real Writing Jobs

Friday, May 28, 2010

Ezunsecured introduces an era to your unsecured loans

To start a business either small or big, you need sufficient invest. Personal loans are mostly expected to purchase one’s desired commodity. Perhaps you have faced the ugly sides of loans offered by most banks & companies and slapped out due to several reasons. However, Ezunsecured can be a perfect solution for you with their winning features.

Small business loans are the ease solution for small business owners to start his business or to expand business. In most cases, entrepreneurs need start up loans or shared invests to start a small business, often they need loans for their business expansion. Most loans policies need numerous strict rules and need mortgages to approve loans. The secured loans cannot meet up the needs for entrepreneurs, as they need a better choice other than mortgages. Unsecured loans can cope with this issue and provide small business owners economical flexibility to grow his business. You do not to mortgage your properties to receive loans with an unsecured loan policy. You have to fill up a form only, then ask for quote from them, interact with the corresponding official and get approved loan! The simplicity and flexible procedure make unsecured loans so popular.

Successful businesses also needs business loan to expand their business and win over their competitors. Big businesses have huge commodities and properties to deal with loan equities but the flexible unsecured loans still save them from hazards and provide quick support.

Unsecured personal loans play vital role to meet up general people’s need. Most people need personal loans to purchase their desired commodities like apartment, car, boat, college fees and so on.

Ezunsecured offers unsecured personal loans, business loans & unsecured small business loan. You do not have to provide any collateral or full documents to apply for the loan, and the interest rate is surprisingly small (only 6%). Customers have access to their checkbook and they allow lump-sum funding to their valued clients. Be with Ezunsecured and enjoy your easy life.

Friday, May 14, 2010

Google followed Bing style on SERP

Bing introduced an exciting look to their search criteria, their unique graphical outlook touched people’s attraction. Finally, Google realized it, felt it and changed their boring outlook. Yes, you heard the right thing, this is true, not fake. Google is following Bing, they changed their search interface to second Bing for their gorgeous outlook. The new look is definitely eye-catching and appealing, but still it needs some advanced graphics works.

If you still have not followed the issue, the above picture can help you to fix the issue.

Wednesday, May 5, 2010

Alertpay: Paypal alternative to all countries

Paypal is a disgusting payment solution to the people. It accepts only 55 countries whereas over 200 countries exist, they are trying to introduce 'aristocratic class' and monster 'racism'. People around the globe are disappointed at their stupidity.

However, there is a solution to overcome the situation and kick off Paypal. Alertpay, is the solution. You can send and erceive money from anywhere in the world using alertpay. It provides solution to sell products online to all users.

Signup with alertpay, its free.

Tuesday, April 13, 2010

Google looses chat popularity for its restricted mania (gtalk error)

Save $10 at Silkies

Google is loosing significant users from chat (gtalk) as they allow only Chrome browser for chat. For other browsers Google says that 'Unable to reach Gmail, Please check your internet connection'.

I always prefer to chat on Yahoo messenger for their wide variety and many privileges. Yahoo community is great and helpful; you will never feel bore with Yahoo chat community & chat rooms. At the same time, Yahoo is consistently updating their support & technology improvements on chat application. However, is Google doing so? Do you think that Google is worth the same value as Yahoo?

No, I do not think so. Google has several limitations on chat feature. They have some serious problems that never tried to overcome; rather they imposed newer restrictions time to time. The latest act is 'Chrome mania'.

Yes, Google only allows 'Chrome' browser for chat (gtalk), discards any other browsers. First, I thought that it is my internet connection problem as I am from Bangladesh and internet speed is so poor here. 2-3 months ago, it was very common to see 'chat invisibility' now, but after some hors chat is available. I realized that it happened due to slow connection for those hours. However, the situation worsens for last months. I never found gtalk available on my Gmail, from any browser. I tried using Firefox mozilla, Opera, Internet explorer; but never watched gtalk alive in the gmail menu. I was completely fade up with this trick. After 2 months I installed Chrome, it took 45 minutes to download the installation filed from Google server! What a waste of time! Then I run Chrome on my computer and amazed that gtalk is available! I was overwhelmed, wanted to check back. Therefore, I opened Firefox, Opera and Chrome at the same time and found that gtalk is available on only Chrome. Google shows the message 'Unable to reach Gmail, Please check your internet connection' in all other browsers.

Thus, it was obvious to me that Google restricts their chat feature for other browsers. They allow only Chrome for their gtalk feature. It may be successful for the people leaving in countries of high-speed internet connection like United States, Europe. However, for countries of low speed internet connection, it will not work that great. Certainly I’m not going to install Chrome for 45 minutes every time. Not just me, more users are leaving gtalk and use Yahoo chat more and more. Google is significantly loosing users and their trust. People are getting annoyed on Google.

Friday, March 19, 2010

Impressive Gods and Goddesses Web Hosting $6.95

From the very beginning if the living in Indian sub-continent the Hindu worship their Gods and Goddesses. There are more than millions of Gods and Goddesses in their religion, their worship ritual also vary from location to location. The most important thing is their Goddesses. Goddesses have superior power compared to Gods, and the system reminds us the old-traditional aged 'women powered society'. Critics use to conclude that the Hindu Goddesses have clear similarity with the Pagans and Pagan's Goddesses (Pagan is the most ancient social ritual in the history of this universe).

Some emphatic Gods and Goddesses are depicted below:
1. Shiva & Parvati:

2. Radha & Krishna:

3. Lord Vishnu & Goddess Lakshmi:

Monday, February 1, 2010

The unique features of Windows 7

Windows 7 is the latest and most fashionable operating system launched by Microsoft to over 500 million of people in the universe. Computer users always look for the upcoming newer features by windows operating system because windows operating system covers 97% computers’ operating system in the world. Blessed with newer features Windows 7 is a matter of attraction to the end users specially for the young people who love to extend their application experience beyond decades. This article will demonstrate the amazing features of Windows 7.

File sharing in windows operating system is beyond limitation. Home Group, using this feature users can connect to their friends and families more easily. If two or more users have windows 7
running and want to share printer, photo, video, games then they can do so without any hard work. Sharing files became more easy with Windows 7, users just have to know the interface and icon to launch the associated program, create a home group and transfer files or movies of any length regardless of bandwidth. This feature is password protected, so nobody can interrupt your privacy nor track what you are doing with your friends in the Home group.

Now you can jump to any file or folder you tend to use frequently. Jump Lists is another extended feature of Windows 7. It enables you to go straight to the documents, songs or websites that you use to open everyday without complex browsing. With this feature, you can reach the website immediately that you use frequently through internet explorer 8. Windows Media Player 12 shows the list of frequently played music or tunes that you like more.

Accessing computer from remote area is now at your hand. Remote media streaming is another feature of Windows 7 that let you watch your favorite video, listen to your favorite tunes. Even when you are away from home, you can enjoy the music and video clips with this feature. You will not experience the difference between home and abroad.

Your fingers can control your computer, perform all the jobs needed for you. Windows Touch is the most powerful feature of Windows 7. Touch screen facilities are available in the previous versions also, but this feature overrides all sort of previous assumptions. You can do any job on a computer if it has touch screen option and windows 7 are installed on it. Using your fingers you can direct windows components to follow your orders and execute thereby. Windows 7 enables multi touch technology for the users that extends user’s comfort. If you want to zoom anything just place your two fingers paired on the screen of a multi touch compatible computer.

Windows 7 provides users more attractive functionalities like parallel processing applications that enables multiple processes run together without rambling the operating system. Parallel batch process makes the processes even faster, align all the processes onto one pack, use CPU cycles effectively reducing empty cycles, thus assures full use of processor. Copy, move, operations are more faster on this operating system than the previous versions, pipelining made it more convenient.

Wide accepted functionalities have made Windows 7 winning operating system. With enhanced performance, newer functionalities, queer visual display, touch screen, multiple process parallelism Windows 7 is going to win the hearts of the customers allover the world. 2010 is going to be the year for Windows 7.

Saturday, January 23, 2010

Mehjabin wins Lux channel i superstar 2009 award

Mehjabin Chowdhury won the most exciting beauty contest Lux channel i superstar 2009. After 6 months competition the beauty contest ended with Gala-round a few hours ago. Mehjabin became lux superstar 2009, while Ishana won 1st runner-up crown and Swarna won 2nd runner-up crown. The gala round was composed of 5 final beauty contestants. Chaity, the superstar 2008, crowned the new beauty winners.

The new superstar, the most beautiful pageant, Mehjabin won a new car as award, scholarship in foreign fashion design course and contract for a film heroine. Ishana won a check of BDT-5 lacs as 1st runner-up and Swarna won BDT-3 lacs as 2nd runner-up award. The beauty contest began from division level, then the best 125 beauties were selected for round-up grooming. After 5 months, top 10 were chosen among the beauty pageants among all. The list then further curtailed to top 5 who participated in today's Gala round final.

The winners are the clear reflection of people's choice. Numerous sms votes added people's voice to this competition. In the past surveys and polls Mehjabin won people's heart, most of them said that she deserves the wright to win the competition and finally it is.

Uniliver and Channel i co-sponsored the gorgeous beauty contest for the 5th year in a row. Nawshad Karim, the secretary of Uniliver Bangladesh region, said that "the competition represents the feminine characteristics of Bangladesh and its sole try is to advance it further beyond any limit". Faridur Reza Sagar, the director of channel i, stated that "We pay attention to quality as well as beauty, that's why the lux superstars convey the winning situation everywhere in both Bangladesh and outside".

Lux xhannel i superstar 2009 beauty contest was jusged by three judges - Sayed Samsul Haque, Afsana Mimi and Subarna Mustafa. Asadujjaman Noor M.P. , Ali Jaker, Shaikh Siraj, Mahin Khan and more respected people acted as judges time to time.

The Gala night was celebrated by the most charming singers of Bangladesh now-a-days like Ayub Bachchu, Topu, Sumon, Safin Ahmed etc. All types of people related showbiz were present in the grand gala night to enjoy the final show. This final show is broadcasted directly by channel i.

After 6 months long grooming session the beauty contest ended with gorgeous finshing. The next superstar contest will begin after 3-4 months in 2010.

Tuesday, January 12, 2010

Repair Windows 7 Registry Errors and Prevent Crashes

The importance of fixing Windows 7 registry errors cannot be overstated. Since your system interfaces with the registry incessantly, Windows 7 registry errors can afflict different processes with errors. If any problems occur within the registry, it's important to resolve them quickly.

Backing up the Registry with System Restore

One of the best ways to maintain a clean registry is to consistently back up your registry. You can do this by using System Restore. Here's how to backup your registry:

1. Click Start.
2. Open System Tools.
3. Click System Restore.
4. If you have NOT previously utilized System Restore, then click "Next." If you HAVE previously used this function, then check the dot next to "Choose a different restore point."
5. In the following menu, enter or select your desired restore point.
6. Click Next.
7. Click Finish.

You will need to confirm that you wish to restore the system. Your computer will automatically restart in order to accomplish the system restore. Once your computer has started up, you will notice that all settings and processes have been restored to your selected restore point.

Making a Backup with Regedit

If you are encountering registry problems, then System Restore can work as a quick fix. You can also backup your registry another way. Here's how:

1. Click Start.
2. Type "regedit" in the Search box.
3. In the top menu bar, select "File."
4. Click "Export."
5. Then, choose the destination location for the backup files. Make sure you click the "All" option within the Export Range option.
6. Click "Save."

This action will backup your registry to a specified location. This is a great way to safely maintain your registry.

You can restore or backup the Registry using advanced methods such as forming.reg files or importing files from regedit. These methods are a bit harder and require meticulous attention to detail.

Use a Registry Cleaner for a Thorough Fix

One of the simplest ways to repair your registry is by downloading a registry cleaner. A registry cleaner is designed to evaluate your registry and resolve pending issues.

Also, using a registry cleaner will lessen the need for using System Restore. Restoring your system too many times can often elicit confusion since it's hard to keep track of the exact time you modified any attribute of your system.