INSTALLING XP IN 10 MINUTES

0 comments
INSTALLING XP IN 10 MINUTES!
STEP1 : After the Copy Part is Over ... System is Rebooted as we all know In general Foramatting Procedure...
Now After Reboot The Below Image Will Appear....


http://www.winsupersite.com/images/reviews/winxp_rc1_rev_01.gif
STEP 2: Now As This Image APPEARS You Have to Press  "Shift + F10 "  . This Will Open The command Prompt...  Now type  taskmgr  in it. This will open the Task manager .

STEP 3 : After The task Manager Opens Goto Processes ... And Find "Setup.exe"  process and Right CLICK on It.... and set the Priority to Highest....


STEP 4: Now Just Watch the Set It will take around 9 minutes and 2 minutes for Tolerance(depends System to system)....

Thats the Overall Tutorial...Hope You all Have LIKED IT...

So When you Format your PC Next Time It will Really Save Your TIME i.e around 20 to 25 minutes...
Continue reading →

Top Viruses of 2009 : Based on Ranking

0 comments

Top Viruses of 2009 : Based on Ranking

http://computerrepairmaintenance.com/images/computer-virus-picturejpg.jpg
Rank 1: Win32/Conficker
This virus is a network worm and exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system, allowing an attacker to remotely attack a computer without valid user credentials. Win32/Conficker infects the computer using unsecured folders, removable medium or by making use of Autorun facility enabled by default in windows. This threat contacts other domain names to download additional malicious code.
To avoid this threat, end users must update their system with the patch already available since October.
Rank 2: INF/Autorun
This is the most common threat that infects a PC by creating an autorun.inf file. The file contains information about programs meant to run automatically when removable devices are connected to the computer. End users must disable the Autorun feature enabled by default in windows. Since, use of removable devices is very popular, you can clearly see the reason why this threat has a rank of 2.
Rank 3: Win32/PSW.OnLineGames
This threat belongs to a family of Trojans that is meant to cause harm to game players by stealing their user credentials and other personal or financial information. This information is then sent to the intruder’s PC. Game players must remain alert as this threat has been found in large volumes.
Rank 4: Win32/Agent
Win32/Agent is a major threat to several end users as it copies itself into the temporary locations and steals information from the infected PC. This malicious code adds entries into the registry, creating several files at different places in the system folder, allowing it to run on every startup. This way complete information is gathered about the infected PC and then transferred to the intruder’s PC. As a protection measure, use a good anti-malware, disable Autorun facility in windows and do not click or open any unknown files.
Rank 5: Win32/FlyStudio
This threat is designed to modify the settings of victim’s internet browser by modifying the search queries and directing the user to advertisements. This threat seems to target the people of China. However, its presence has been reported in other regions like North America. It seems that the malicious code has been deployed by another family of malwares.

Continue reading →

find who is invisible on gmail or gtalk

0 comments
gmail hack

Step 1.

Set the target user as off the record while he/she is online. This can be done by simply clicking on the option in the chat window.





Step 2.

Try sending an IM when he/she is invisible or offline.
If he/she is invisible he/she will receive message. If he/she is offline you will receive an error “did not receive your chat”.
This hack will only work if you mark the target user as off record when he/she is online. It is a limitation.

How does it work?
When the chat is off the record, it will no longer stored in the gmail account.
When you send IM to an invisible / offline user it will be delivered by default. At the receiving end the IM will receive as a pop in form of chat window if the user is invisible. If the user is offline it will receive as an email in the inbox.
The main problem with this hack is if the target user is using another email client or desktop version.
Continue reading →

some computer tricks

0 comments

This is a complimation of computer tricks, mainly security and privacy related.

Getting Ip’s:–

To see the ip all computers you are connected to (web servers, people attempting to hack into your computer). Go to dos (start>run>type command) and run the netstat command. Type netstat /? for details.

Type netstat -r at the command prompt to see the ip of all computers you are connected to

In MSN (and other programs) when you are chatting to someone everything you type goes through the MSN servers first (they act as a proxy) so you see their ip rather than who you are chatting to. You can get round this by sending them a file as MSN doesn’t send file through its proxy.When you type the netstat -r (or -a for a different view) the ip’s are under the foreign address table. The ports are seperated by a : . Different programs use different ports, so you can work out which ip’s are from which program.

Connecting to other computers and what ports are:–

Servers send information. Clients retrieve. Simple. Windows comes with a built in program to connect to other computers called telnet. To start Windows telnet Start menu> Run> type Telnet. Click connect> remote system Ports are doors into computers. Hosts are computer names (ip number or a name that is translated into the ip automatically) Different programs open different ports, but they always open the same ports so other computers know which port to connect to. You can get a port list listing all the different ports, but a basic one is: 11 :- Sends info on the computer 21 :- FTP (File transfer program) 23 :- Telnet (Login to the computers command line) 25 :- Smtp (Sends mail) 80 :- Http (Web pages) There are thousands of different programs using different ports. You can get programs called portscanners which check a computer for all ports up to a certain number, looking for ways in. You can portscan a computer looking for ways-in. Anyway, back to telnet. Type www.yahoo.com as the host and port as 80 the click connect. If nothing happens, you’re in. Wow. You are connected to Yahoo’s server. You can now type http commands (you are connected to an http server, so it supports http commands). Ie. on an ftp server you can type open and it will do something. On an http server it will just wonder what the hell you are on about. Type get / http/1.0 then press enter twice to get the file on the server at / (try /index.html) etc.)

Making undeletable, unreadable folders

Tested on Windows 95/98 By holding down alt, then typing numbers on the number pad (right of the keyboard) you can create special characters. If you hold down alt, then press 1, then let go, you got the ascii character 1. You try some randomn numbers. This goes all the way up to 255. Open a dos prompt, and type md (alt+1+9+4)someword. md is the dos command to make a directoy, now try and open the directory in Windows, you can’t. To open it, type ren (alt+1+9+4)someword someword (ren is the dos command to rename)

Proxies

Proxies are computers that you connect through, hiding your computer. Most aren’t anonymous, they give away your ip. Some are. Good anonymous proxies: mail.uraltelecom.ru:8080 and 194.247.87.4:8080.Different programs require different ways of using proxies. To do it in internet explorer 5 go to tools, internet options, connections, settings. In the above proxies they are in the format host:port

Password files

If you lock yourself out of Windows stuff, all passwords are stored in files called *.pwl in C:windows. In Unix, passwords are normally stored at etc/passwd. This can be viewed using the cat command (prints a file to screen): cat etc/passwd. Make sure you’re passwords are shadowed (not actually in etc/passwd). Also make sure they aren’t in a file called shadow, especically not in a file called etc/shadow.Unix passwords are encrypted far better than Windows one’s (to be fair, Windows 95 isn’t designed for users), but can still be cracked through a program called jon.
Continue reading →

how internet works?

0 comments

Visualization of the various routes through portion of the Internet
The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private and public, academic, business, and government networks of local to global scope that are linked by copper wires, fiber-optic cables, wireless connections, and other technologies. The Internet carries a vast array of information resources and services, most notably the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail. In addition it supports popular services such as online chat, file transfer and file sharing, gaming, commerce, social networking, publishing, video on demand, and teleconferencing and telecommunications. Voice over Internet Protocol (VoIP) applications allow person-to-person communication via voice and video.
The origins of the Internet reach back to the 1960s when the United States funded research projects of its military agencies to build robust, fault-tolerant and distributed computer networks. This research and a period of civilian funding of a new U.S. backbone by the National Science Foundation spawned worldwide participation in the development of new networking technologies and led to the commercialization of an international network in the mid 1990s, and resulted in the following popularization of countless applications in virtually every aspect of modern human life. As of 2009, an estimated quarter of Earth's population uses the services of the Internet.
source(wikipedia)
Continue reading →

LEAVE YOUR REQUEST FOR SOFTWARES

0 comments




LEAVE YOUR SOFTWARE REQUEST IN COMMENT BOX WITH YOUR EMAIL ADDRESS I WILL EMAIL YOU THE LINK OF THE SOFTWARE
Continue reading →

Cannot Access Regedit, How to Fix It?

0 comments
Cannot Access Regedit, How to Fix It?


Registry Editing has been disabled by your administrator


First we'll begin with the method that appears to work the best.

Method 1 - Enabling the Registry with VBScript

Doug Knox, a Microsoft Most Valuable Professional, has created a VBScript that enables or disables the Registry Editor based on the following location in the registry. Of course, since the registry editor is disabled, you can't change it manually, so Doug wrote a Visual Basic Script to accomplish the task.

HKey_Current_User\Software\Microsoft\Windows\CurrentVersion\Policies\System\

Visit Doug's page and download Registry Tools VBScript to your desktop, double-click on it to run it, then reboot your computer and try to open the Registry Editor.

If this fix didn't solve your problem, try method two shown below.

Method 2:  Use Symantec's tool to reset shell\open\command registry keys

Sometimes worms and trojans will make changes to the shell\open\command registry entries as part of their infections. This will cause the virus to run each time you try to run an .exe file such as the Registry Editor. In these cases, visit Symantec's website and download the UnHookExec.inf file to your desktop. Right-click on it and choose Install. Restart your computer and then try to open the Registry Editor.


Method 3: Rename Regedit.com to Regedit.exe
Some viruses and other malware will load a regedit.com file that is many times a zero byte dummy file. Because .com files have preference over .exe files when executed if you type REGEDIT in the run line, it will run the regedit.com instead of the real regedit.exe file.

Delete the regedit.com file if its a zero byte file to restore access to REGEDIT. In some cases, such as the W32.Navidad worm, you'll need to rename the REGEDIT file to get it to work.



Method 4: Windows XP Professional and Group Policy Editor

If you have Windows XP Professional
and access to an administrative user account, you could change the registry editor options in the Group Policy Editor.

  1. Click Start, Run
  2. Type GPEDIT.MSC and Press Enter
  3. Go to the following location



    • User Configuration
    • Administrative Templates
    • System


  4. In the Settings Window, find the option for "Prevent Access to Registry Editing Tools" and double-click on it to change.
  5. Select Disabled or Not Configured and choose OK
  6. Close the Group Policy Editor and restart your computer
  7. Try opening REGEDIT again
Although there are a few other ways, the above ways I have used with great success in re-enabling the REGEDIT command. If you are interested in more ways to reactive the REGEDIT command, you may want to visit a site called Killian's Guide, that goes into more detail on a variety of ways to get the registry editor to work again.

Continue reading →

EARN MONEY ONLINE FREE ITS TRUE NOT FAKE

0 comments



Earn money online by just clicking
click on the pic to join this site its good check this pic this amount is earned my me



CLICK HERE
Continue reading →

END OF THE INTERNET IN 2012 ITS TRUE....

0 comments

According to research that's supposed to be published later this year, growing demand for Internet use will soon outstrip the stamina of the infrastructure supporting it, and the Internet will cease to be reliable by 2012. Complete anarchy will ensue, and the world will essentially end along with the Internet we created for it. Perhaps this is what the Mayan prophecies meant?

Reasoning from a Respected 'Think-Tank' Despite tens of billions of dollars spent on upgrades, expansions, and renovations on networks throughout the continents, it seems that this isn't enough to tide the hungry connected world at large. Aside from the high demand for entertainment such as YouTube, the demand for Internet service is growing at a rate of 60% every year. The statistic, which was drawn up by the University of Minnesota, didn't take into account the percentiles of India and China, comprising about a third of the world population.

According to experts at Nemertes Research, "a respected American think-tank," the Internet's existing infrastructure in 2012 will not be able to cope with the exceeding amount of bandwidth. It'll become overloaded and essentially... end. They predict that problems will already begin to show as early as next year, and they blame (specifically) YouTube, BBC's iPlayer, and the amounting crowd of people who are working from home, utilizing the Internet. It'll begin with users' Internet connections becoming nonfunctional for several minutes at a time, but within just a few short years, there're going to be vast brownouts where "PCs and laptops are likely to operate at a much reduced speed, rendering the internet an 'unreliable toy.'"

I thought laptops were PCs? And wait-- how does the speed of the Internet affect the speed of one's computer overall? Hmm, this writing sounds a bit naive to me. Reasoning from a Lowly, Humble Editor In my 'professional' opinion, this is about as worrisome on a worldwide scale as the swine flu is (scary, yes; going to kill tens of thousands or even thousands for that matter? I doubt it). The fact that the author of the original article seems to be under the impression, whether told by the interviewee from Nemertes Research or of his own genius, that personal computers themselves are somehow going to "jitter and freeze" of their own accord and then the Internet brownouts will occur, just triggers some defense in my mind-- a voice whispering the words "fouled up disinformation" perpetually. Perhaps I need to see my doctor about that.

The idea that the Internet is under a great strain is something I believe is true. More and more are people not only relying on the Internet for news, communication, income, and (mostly) entertainment, but they're becoming addicted to it, spending hours upon it every day, and using a high amount of bandwidth month to month. I can see the backbone of the Internet bowed in several years, with some minor outages in areas that haven't yet fully upgraded the infrastructure in lieu of demand, but I find it very unlikely that the Internet will one day permanently snap and become an un-fixable, unreliable mess with a mind of its own, sometimes working, usually not. I especially can't see myself hitting my head on my computer until it's a bloody mess because the mysterious 2012 Bug reduced my processor speed to an irreversible 133MHz, rendering it useless.

That's just me, though. What's your take on it? Is the Internet and civilization as we know it doomed for an ignominious death come 2012, or is this another Conficker Worm (knock on wood)? If you've any Armageddon Preparedness Plans, please list them below for the community to build upon.

When the Internet really does "break," I'll laugh as we slip into worldwide anarchy because we've been so connected for so long, and then you can send me hate mail for it-- assuming you have access to your email. We might have to resort to stamps again.

Continue reading →

USE USB AS A KEY TO START WINDOWS

0 comments
Most of us are concerned about the security and privacy of our data. We put login passwords, encrypt data and do various other tricks to ensure that someone cannot access our system without our authorization. Hardware manufacturers have also started exploiting our desire for data security by offering fingerprint readers, face recognition and other fancy stuff. If you are paranoid about who accesses your system, you can use a simple trick to prevent the system from booting unless you want it to boot.
This can be achieved by using a regular USB/pen/thumb drive (whatever you call it). Basically configure your system to boot windows from USB stick. The hack would be more than enough to keep even your curious geeky computer friends from booting into the system. That said, it is by no means foolproof (which security measure is? ) so you might not want to bet your life on it.
*** DISCLAIMER : the following method requires you to make some changes to your operating system. MakeUseOf cannot accept any legal liability if anything goes wrong with your PC and you should proceed at your own risk. Please read the instructions thoroughly before beginning and if you are still not sure what you are doing, you should seek help from a knowledgeable friend ***
A key requirement for the hack to work is that your system should support booting from a USB device. This can be verified from within the BIOS menu. So if you have an older system that doesn’t support booting from USB devices, this one is not for you. We will cook up something else! Although, now that I think about it, theoretically (because I have not tried) the hack should work with a floppy disk as well. So you guys with older systems can also follow along and let us know if it worked.
What we are going to do is transfer some of the important files (you will see which ones) that Windows needs in order to boot, to the USB drive. Now if someone was to boot up the PC without your USB drive the system won’t find these important files and will thus fail to boot.
So now that you know the concept, let’s get working:
  • Format the USB drive.
  • Within Windows Explorer go to Tools > Folder Options. Within the View tab, choose “Show hidden files” and uncheck “Hide protected operating system files”.
  • usb key lock computer
  • Open up the Windows Partition (usually C:), copy boot.ini, NTLDR and ntdetect.com onto your USB drive.
  • Boot up the system and change the boot order preference to check for a USB device first. You can access the BIOS menu generally by hitting F8 when the computer just starts.
Just in case you are curious, the boot.ini file is required to tell where the operating system resides. NTLDR is the NT loader which actually loads the operating system. ntdetect.com detects basic hardware that is required to boot up the system.
The changes are fully recoverable, although it would require some work for the uninitiated. If something goes wrong or you want to restore back things as they were then use the Recovery Console from your Windows CD.
Continue reading →

mac os on pc

0 comments

Want to use the glamorous Mac OSX?  Don’t have money to buy a Mac?  That’s okay because a new guide has been released that will allow you to install Leopard version 10.5.1 in a single step to your PC.
You will have to meet some very specific hardware requirements, non-Core Intel processors are not supported (meaning anything in the Pentium line), Core Duo or Core 2 Duo processors are required.  AMD processors are not supported at this time though a patch is in the works for that.
After confirming you have the correct processor, you will need a blank DVD-R to burn the ISO image files to.  DailyApps has all the links to the files you will need to complete the installation.
However, some of your hardware may not work, WiFi cards and sound seem to be the most common but since Apple supports Intel, ATi and nvidia graphic cards there shouldn’t be any problems.
The installation files are about a 2.1GB download which will take a while no matter how fast your connection is and it is recommended that you burn the files to DVD at a slower than normal speed.
That’s just the preparation, to actually install Leopard, pop the DVD you just created in your drive, boot from it and let the installation begin.
Since Mac OSX Leopard uses the HFS+ file system, it’s not clear if you will be able to partition your drive and be allowed to dual boot Leopard and Windows XP/Vista.  Try that at your own risk.  If you can live with wiping your whole drive just to try this, it’s probably the safer method.
You didn’t think I’d let you off that easy, did you? This falls on a gray area of the law and violates Apple’s EULA.  It’s only a matter of time before Apple puts an end to this and is it really worth the risk?  That’s just up to you.
Continue reading →

Run Mac OS X on a PCn windows platform

0 comments

Run Mac OS X on a PC

by NISHANT SRIVASTAVA




People have long wanted to run the Mac OS operating system on PC hardware, specifically on Intel and AMD architectures. But despite pleas and prayers, that wish remains unfulfilled.
Although running Mac OS natively on PC hardware is not possible, there is another option--running Mac OS X on an emulator. In this article, I will show you how to install and run Mac OS X Panther on your PC using PearPC, a free, architecture-independent PowerPC platform that runs on PCs. To check out PearPC's features, go to the PearPC-PowerPC Architecture Emulator web site.
Here are the steps you'll take to use PearPC to install Mac OS X:
  1. Download the PearPC PowerPC Architecture Emulator.
  2. Obtain hard disk images for use with PearPC.
  3. Obtain images of your client OS installation disk.
  4. Configure PearPC to use the hard disk image and the OS images.

Downloading PearPC

Download the PearPC PowerPC Architecture Emulator. Once it's downloaded, extract its content to a folder, say, [Desktop]:\PearPC. This is the folder that is going to contain all of the files you'll see in the next couple of sections.
Note: [Desktop] refers to the path of my Windows desktop; that is, C:\Documents and Settings\Wei-Meng Lee\Desktop\.

Hard disk images

To install Mac OS X on the emulator, you need a hard disk image. You can download preformatted hard disk images from http://pearpc.net/downloads.php. Two disk sizes are available: 3GB and 6GB. If you plan to install the full Mac OS X, then use the 6GB image. If you have limited disk space on your hard drive, use the smaller, 3GB image. Be aware that the default install of Mac OS X takes up a little more than 3GB, and so you need to unselect certain components during installation if you use the 3GB image.
The disk images come in two formats: BZ2 and RAR. I used the 6GB RAR disk images. You need to uncompress the disk image before you can use it. To uncompress the RAR image, I used WinRAR from http://www.rarlab.com/download.htm. Uncompress the image and save it in the [Desktop]:\PearPC folder.

Making images of your client OS

To install Mac OS X on your hard disk image, you need to make copies of your Mac OS X installation disk in ISO format. You can use Nero or any other disk utility to save CDs or DVDs in ISO format. In my case, I have saved the images in the C:\PearPC folder. I have named the first disk Panther1.iso.
Note: You need to purchase Mac OS X in order to run Mac OS X in PearPC.

Configuring PearPC

Once you've taken the previous steps, you're ready for the final step: configuring PearPC to use the all the relevant disk images. To do it, you need to create a configuration file. You can find the instructions on how to create one manually at http://pearpc.net/guides.php?guides_id=2. Or you can download a Windows application that does all the hard work for you. In my case, I used the PearPC Control Panel to help me manage my Mac OS X emulation.
Launch PearPC Control Panel and click on the Create New Configuration File icon. You will see the first screen as shown in Figure 1. Click on Continue to proceed to the next step.
Figure 1
Figure 1. Using the Create Configuration File wizard
In the next screen, you have to supply a few pieces of information (see Figure 2). First, specify the location of the PearPC emulator. In my case, it is [Desktop]:\PearPC\ppc.exe.
Next, specify the location of the hard disk image; that is, [Desktop]:\PearPC\macosx_6gb.img.
Note: Be sure to replace [Desktop] with your own desktop path.
Also, set the amount of memory you want to set aside for Mac OS X. (I have allocated 255MB.) Click on Continue.
Figure 2
Figure 2. Creating a new configuration file
In the next screen, you have the option to specify the screen resolution and color depth to use. Click on Finish when done (see Figure 3).
Note: I tried to enable networking, but I never got it to work. Also, use G3 and not G4 CPU emulation.
Figure 3
Figure 3. Specifying additional options
Give a name to the configuration file and save the file in the location specified (see Figure 4). Name it Mac OS X Panther and save it in the location [Desktop]:\PearPC\macosxpanther.cfg. Click on Finish.
Figure 4
Figure 4. Completing the wizard
You should now see the icon for your Mac OS X Panther in the PearPC Control Panel (see Figure 5). You need to complete one final step before you start installing Mac OS X on your PC--check the "CD-ROM device is installed" option and specify the location of the Mac OS install disk image. In my case, it is [Desktop]:\Panther1.iso. This is the image that will be used to boot up the emulator.
Figure 5
Figure 5. The completed configuration file
Figure 6 shows the files in my [Desktop]:\PearPC folder. The important files are highlighted.
Figure 6
Figure 6. Files in the PearPC folder
That's it! Double-click on the Mac OS X Panther icon and you should see the PearPC 0.3.0 window pop up (see Figure 7). Your Mac OS X installation should start soon afterward.
Note: It took me quite a while to get my Mac OS X to install. I encountered a number of failed attempts--when I booted into Mac OS X, it prompted me to restart my machine. But after several attempts, it worked.
Figure 7
Figure 7. Installing Mac OS X
Once the OS is installed, you will be asked to restart the machine. For subsequent attempts to run Mac OS X on your emulator, you should uncheck the "CD-ROM device is installed" option so that it can boot directly from the hard disk image. If the installation is performed correctly, you should see something like Figure 8 when Mac OS X boots up.
Figure 8
Figure 8. Mac OS X booting up
Figure 9 shows I am having fun with my newly installed Mac on my PC.
Figure 9
Figure 9. Running Mac OS X on a PC!
And if you still doubt if I am really running Mac OS X on my PC, Figure 10 will prove it to you.
Figure 10
Figure 10. Running Mac OS X in my Windows XP PC

Summary

Before installing PearPC and using Mac OS X, you need to keep several things in mind:
  1. You need a license to run Mac OS X. That is, you need to buy a copy of Mac OS X.
  2. The installation process takes time. Don't install Mac OS X on a slow machine; I tried the steps outlined in this article on three different machines--933MHz, 1.7GHz, and 3.0GHz, all equipped with 512MB of RAM. The 3.0GHz machine installed significantly faster compared with the rest, but it still took me several hours to get all of the installation done. Also, make sure you have lots of free hard disk space. The hard disk image itself takes up 6GB, and the additional installation disk images are going to take up a few more gigabytes.
  3. Even though the installation process is painfully slow, once the system is installed it is actually quite responsive. While you won't be able to fully experience Mac OS X as if you were using a real Mac, the emulation provides a good way for you to try out Mac OS X before you head to the nearest Apple shop to get the latest iMac.
Have fun, and let me know if PearPC works for you.
Continue reading →

legal notice at start up

0 comments
legal_noticesIf your PC has multiple users then you can now display legal notice to every user before they login to your PC. This legal notice will be displayed at every startup just before the Desktop is loaded. Using this you can tell your friends about the do’s and dont’s in your computer when they login in your absence. Well you can do this pretty easily. For this there is one small registry hack. Here is the step-by-step instruction to do this.

1. Goto Start->Run, type regedit and hit ENTER
2. Navigate to the following key in the registry
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
\policies\system
On the right side pane look for “legalnoticecaption“, double click on it and enter the desired Legal Notice Caption. Next below this look for “legalnoticetext” and enter the desired Legal Notice Text. The lagal notice text can be upto a page in it’s size so that it can include a set of do’s and dont’s for your computer. After you do this just restart your computer and upon the next startup you can see the legal notice information for your computer. This trick works on both XP and Vista. You can also try it on Windows 7 and should work with no problems.
Hope you like this post. Pass your commments.
Continue reading →
Recommend on Google
 
Copyright 2012 | Design by: Nishant Srivastava
About | Contact | Write For Us | Archive