Wednesday, 9 July 2014

15 Body language blunders to watch out....



15 Body language blunders to watch out for:
Leaning Back too much — you come off lazy or arrogant.
Leaning forward — can seem aggressive. Aim for a neutral posture.
Breaking eye contact too soon — can make you seem untrustworthy or overly nervous. Hold eye contact a hair longer, especially during a handshake.
Nodding too much — can make you look like a bobble head doll! Even if you agree with what’s being said, nod once and then try to remain still.
Chopping or pointing with your hands — feels aggressive.
Crossing your arms — makes you look defensive, especially when you’re answering questions. Try to keep your arms at your sides.
Fidgeting — instantly telegraphs how nervous you are. Avoid it at all costs.
Holding your hands behind your back (or firmly in your pockets) — can look rigid and stiff. Aim for a natural, hands at your sides posture.
Looking up or looking around — is a natural cue that someone is lying or not being themselves. Try to hold steady eye contact.
Staring — can be interpreted as aggressive. There’s a fine line between holding someone’s gaze and staring them down.
Failing to smile — can make people uncomfortable, and wonder if you really want to be there. Go for a genuine smile especially when meeting someone for the first time.
Stepping back when you’re asking for a decision — conveys fear or uncertainty. Stand your ground, or even take a slight step forward with conviction.
Steepling your fingers or holding palms up — looks like a begging position and conveys weakness.
Standing with hands on hips — is an aggressive posture, like a bird or a dog puffing themselves up to look bigger.
Checking your phone or watch — says you want to be somewhere else. Plus, it’s just bad manners.

Watch:https://www.linkedin.com/today/post/article/20140707061900-64875646-the-15-biggest-body-language-mistakes-to-watch-out-for?goback=.mpd2_*1_*1_*1_*1_*1_*1_20140707061900*564875646*5the*515*5biggest*5body*5language*5mistakes*5to*5watch*5out*5for&trk=prof-post

Tuesday, 10 June 2014

Secret Codes

Samsung Secret Codes !
PROGRAMMER CODES!

*#06# displays phones IMEI NO.
*#9999# SW Version.
*#8888# HW Version.
*#0842# Vibrator.
*#0289# Buzzer.
*#0228# Battery Stat.
*#0782# RTC Display (?¿)
*#0523# LCD Contrast.
*#0377# NVM error log (?¿)
*#5646# GSM Logo Set.
*#0778# Sim Serv, Table. (?¿)
*#0638# SIM Network ID.
*#0746# SIM info.
*#0076# Production No.
*#3323# Forced Crash (?¿ don't know, but dose not sound good)
*#2576# SIM error.
*#4357# This screen ( the actural help screen)
*#9324# Netmon <> press the hung up key to exit.
*#0778# To see what your SIM suportes.
*#0746# Your sim type.
*#32439483 Digital Audio Interference off.
*#32436837# Digital Audio Interference on.
*#9998*JAVA# Edit GPRS/CSD settings (S100 only).
*#9998*Help# Screen / List of codes.
*#9998*RTC# RTC Display.
*#9998*bat# Battery Status.
*#9998*buz# Turns Buzzer On.
*#9998*vub# Turns Vibator On.
*#9998*LCD# LCD Contrast.
*#9998*9999# Sotfware Version.
*#9998*8888# Hardware Version.
*#9998*377# Non Volatile Merory Error Log.
*#9998*NET# SIM NEtwork ID
*#9998*778# SIM Serv. Table.
*#9998*968# Remider Tune.
*#9998*NVM# Displays Non-Volitile Mermory Status.
*#9999*C# Netmon.
*#9998*2576# Forces SIM Error.
*#9998*DEAD# Forces Phone Crash.
*#9998*533# (LED).
*#999* Show date and alarm clock.
*#8999*638# show network information.
*#9998*5646# change operator logoat startup.
*#9998*968# View melody alarm.

*2767*MEDIA# Resets the media on phone <>DELETES all downloaded PICS/TONES <>
*2767*FULL# Resets the EEPRON* <>°DANGEROUS°<>
*2767*CUST# Resets the sustom EEPRON.
*2767*JAVA# Resets JAV downloads ( dealets all downloaded midits)
*2767*STACKREST# RESETS STACK.
*2767*225RESET# * VERY Dangerous.

#0111*0000000# Removes SIM Lock.

*2767*66335#
*2767*3700#
*2767*7100#
*2767*8200#
*2767*7300#
*2767*2877368#
*2767*33927#
*2767*85927#
*2767*48927#
*2767*37927#
*2767*28927#
*2767*65927#
*2767*29927#
*2767*78927#
*2767*79928#
*2767*79928#
*2767*82927#
*2767*787927#
*2767*73738927#
*2767*33667#
*2767*85667#

*2767*688# = Unlocking code
*#8999*8378# = All in one code
*#4777*8665# = GPSR Tool
*#8999*3825583# = External Display
*#8999*377# = Errors
*#2255# = call list
#*5737425# = JAVA Something chouse 2and it chrashed.

#*536961# = Java Status Code
#*536962# = Java Status Code
#*536963# = Java Status Code
#*53696# = Java Status Code

#*1200# = AFC DAC Val
#*1300# =IMEI
#*1400# = IMSl

#*2562# ?¿ white for 15 sec than restarts.
#*2565# Check Blocking
#*3353# check code
#*3837# = ?¿ White for 15 secs than restarts.
#*3849# = ?¿ white for 15 secs than restarts.

#*7222# = Operation Typ ( class C GSM)
#*7224# = I got ERROR !
#*7252# = Operation Typ ( Class B GPRS)
#*7271# Multi Slot ( Class 1 GPRS)
#*7271# Multi Slot ( Class 4 GPRS)
#*7337# = EEPROM Reset ( unlock and resets Wap settings)
#*2787# CRTP ON/OFF
#*3737# L1 Dbg Data
#*5133# L1 Dbg Data
#*7288# GPRS Attached
#*7287# GPRS Detached
#*7666# SrCell Data
#*7693# Sleep Act/Deact ( enable or disable the black screen after doing nothen for a while)
#*7284# Class B/C Or GPRS
#*2256# Calibration Info
#*2286# Battery Data
#*2679# Copycat Feature (Activate or deactavite)
#*3940# External loop 9600 bps
#*8462# sleeptime
#*5176# L1 Sleep
#*5187# L1C2G Trace ( activate or deactivate)
#*3877# Dump Of spy trace
5/31/2006 12:15 PM
*#8999*636# Have no clue i see 20 lines
*#8999*8376263# HW Ver SW Ver and build date
*#746565# Checks the locks
*7465625*638*Code# Enables Network lock
#7465625*638*Code# Disables Network lock
#7465625*782*code# Disables Subset lock
*7465625*782*code# Enables subset lock

*7465625*746*code# Enables SIM lock
#7465625*746*code# disables SIM lock

*7465625*28746# Auto SIM lock On
#7465625*28746# Auto SIM lock Off

(*Known Unlock CODES*)

S500/ P400/ E500/ E700/ X100/ X600/ E100/
Enter *2767*3855# with and accepted SIM card If this codes fails, Enter *2767*688# or #*
7337#

A300/ A400 / A800
*2767*637#
Enter code above with an accepted SIM card.

INVENTORS

INVENTORS OF COMPUTER HARDWARE:
(1) Key board — Herman Hollerith, first keypunch device in 1930’s
(2) Transistor — John Bardeen, Walter Brattain & Wiliam Shockley (1947 - 1948)
(3) RAM — An Wang and Jay Forrester (1951)
(4) Trackball — Tom Cranston and Fred Longstaff (1952)
(5) Hard Disk — IBM , The IBM Model 350 Disk File (1956 )
(6) Integrated Circuit— Jack Kilby & Robert Noyce (1958)
(7) Computer Mouse — Douglas Engelbart (1964)
(8) Laser printer— Gary Stark weather at XEROX in 1969.
(9) Floppy Disk— Alan Shugart & IBM( 1970)
(10) Microprocessor — Faggin, Hoff & Mazor – Intel 4004

Sunday, 9 March 2014

How to Change the Displayed Name of the Processor in Windows 7, XP, and Vista

Step One: Open up the Registry editor (RegEdit).
First, click Start, and search RegEdit (Windows 7/Vista). Open up regedit when the search has found it.

Step Two: On the left hand column in Registry Editor, open HKEY_LOCAL_MACHINE, under it,
open up: Hardware->DESCRIPTION->System->CentralProcess
or->1

Step Three: Now you can see a few lines of text on your right side in Registry Editor. Double-Click the one that is named "ProcessorNameString". A small box will pop-up, and you can change the processor's name to anything you like. After your done, press enter and close Registry Editor.

Step Four: Now we will see what we have changed under Windows.
Open Start, and Right-Click Computer, then click Properties in the Context Menu

Step Five: You can see your processor name changed to what ever you changed it to .

Troubleshooting: If the processor name did not change, Do step one, but on Step Two, instead of going into the number 1, go into number 0, and follow the rest of the Tutorial

Full Virus Guide (Explaning Everything)


Viruses
A virus is a piece of software designed to infect a
computer system. The virus may do nothing
more than reside on the computer. A virus may
also damage the data on your hard disk,
destroy your operating system, and possibly spread
to other systems. Viruses get into your
computer in one of three ways: on contaminated
media (floppy, USB drive, or CD-ROM),
through mail and peer-to-peer sites, or as part of
another program.
Viruses can be classified as polymorphic, stealth,
retroviruses, multipartite, armored,
companion, phage, and macro viruses. Each type of
virus has a different attack strategy
and different consequences.
Many viruses will announce that you're infected as
soon as they gain access to your system.
They may take control of your system and flash
annoying messages on your screen or
destroy your hard disk. When this occurs, you'll
know that you're a victim. Other viruses
will cause your system to slow down, cause files to
disappear from your computer, or take
over your disk space.
You should look for some of the following
symptoms when determining if a virus infection
has occurred:
The programs on your system start to load more
slowly. T his happens because the
virus is spreading to other files in your system or is
taking over system resources.
* Unusual files appear on your hard drive, or files
start to disappear from your system.
Many viruses delete key files in your system to
render it inoperable.
* Program sizes change from the installed versions.
This occurs because the virus is
attaching itself to these programs on your disk.
* Your browser, word processing application, or
other software begins to exhibit unusual
operating characteristics. Screens or menus may
change.
* The system mysteriously shuts itself down or
starts itself up and does a great deal of
unanticipated disk activity.
* You mysteriously lose access to a disk drive or
other system resources. The virus has
changed the settings on a device to make it
unusable.
* Your system suddenly doesn't reboot or gives
unexpected error messages during startup.
This list is by no means comprehensive.
A virus, in most cases, tries to accomplish one of
two things: render your system inoperable
or spread to other systems. Many viruses will
spread to other systems given the chance and
then render your system unusable. This is common
with many of the newer viruses.
If your system is infected, the virus may try to
attach itself to every file in your system
and spread each time you send a file or document
to other users.
Viruses take many different forms. The following
sections briefly introduce these forms
and explain how they work. These are the most
common types, but this isn't a comprehensive
list.
Types of viruses

Armored Virus
An armored virus is designed to make itself difficult
to detect or analyze. Armored viruses
cover themselves with protective code that stops
debuggers or disassemblers from examining
critical elements of the virus. The virus may be
written in such a way that some aspects of the
programming act as a decoy to distract analysis
while the actual code hides in other areas in
the program.
From the perspective of the creator, the more time
it takes to deconstruct the virus, the
longer it can live. The longer it can live, the more
time it has to replicate and spread to as
many machines as possible. The key to stopping
most viruses is to identify them quickly
and educate administrators about them the very
things that the armor intensifies the
difficulty of accomplishing.

Companion Virus
A companion virus attaches itself to legitimate
programs and then creates a program with a
different filename extension. This file may reside in
your systems temporary directory. When
a user types the name of the legitimate program,
the companion virus executes instead of the
real program. This effectively hides the virus from
the user. Many of the viruses that are used
to attack Windows systems make changes to
program pointers in the Registry so that they
point to the infected program. The infected program
may perform its dirty deed and then
start the real program.

Friday, 15 November 2013

TOP TEN WEBSITES with their LAUNCH YEAR


* Google : Sept 4, 1998
* Facebook : Feb 4, 2004
* YouTube : Feb 14, 2005
* Yahoo ! : March 1994
* Baidu : Jan 1, 2000
* Wikipedia : Jan 15, 2001
* Windows Live : Nov 1, 2005
* Amazon.com : 1994
* Tencent QQ : February 1999
* Twitter : March 21, 2006

Wednesday, 13 November 2013

Win 8 Keyboard Shortcuts

Who R Using Win 8 ??
Some Keyboard Shortcuts 4 them...
Windows key – brings up the Metro start screen. You can start typing to search for an app, just like the Win7 start menu.
Win + D – brings up the old Windows desktop.
Win + C – brings up the Charms menu, where you can search, share, and change settings.
Win + I – opens the Settings panel, where you can change settings for the current app, change volume, wireless networks, shut down, or adjust the brightness.
Win + Z – opens the App Bar for the current Metro application.
Win + H – opens the Metro Share panel.
Win + Q – brings up the Metro App Search screen.
Win + W – brings up the Metro Settings search screen.
Win + F – brings up the Metro File search screen.
Win + K – opens the Devices panel (for connecting to a projector or some other device)
Win + , (comma) – Aero Peek at the desktop.
Win + . (period) – Snaps the current Metro application to one side of the screen. (Right side)
Win + Shift + . (period) – Snaps the current Metro application to the other side of the screen. (Left side)
Win + J – switches focus between snapped Metro applications.
Win + Page Up / Down – moves the current app to the other monitor.
Win + Tab – opens the Metro application switcher menu, switches between applications.
You might notice that we didn’t show screenshots of how all these shortcut keys work, and there’s a reason for that: you need to test them out for yourself to really learn how they work.
Win+X – lunch kind of start menu, very useful
Windows Key + Print Screen saves a screenshot into your Pictures folder. It’s quite handy.

Sample Text

Muthukumar. Powered by Blogger.

About Me

My Photo
Hi i am Muthu kumar,software engineer working on PL/SQL,ASP.Net,VB.Net,C#.Net,SQL Server.