Get the latest updates from us for free

Sign-up for FREE weekly Newsletter.
Showing posts with label Tutorials n Tips. Show all posts
Showing posts with label Tutorials n Tips. Show all posts

iPhone Has Passed a Key Security Threshold

Be the first to comment!
Labels: ,
Does society really want extremely private mobile devices if they make life easier for criminals? Apple's newly toughened standards sharpen the focus on that question.

Less than a month after Apple first shipped the iPhone in June 2007, a group called Independent Security Evaluators documented deep security design flaws in the device. Apple's most embarrassing flub: every iPhone application that Apple had written ran with so-called root privileges, giving each one complete control over the entire phone. Hackers found bugs in those apps that could be used to take over the phone from the inside. Apple didn't fix the design flaw until January 2008.
But after that rocky launch, Apple invested heavily in iPhone security. It's still possible for a hacker to take over a phone, but it's increasingly difficult, largely because each app runs in its own isolated "sandbox." The phone even verifies its operating system when it boots. Today the Apple iPhone 4S and iPad 3 are trustworthy mobile computing systems that can be used for mobile payments, e-commerce, and the delivery of high-quality paid programming—all of which bring Apple significant revenue in the form of commissions.

In fact, in its efforts to make its devices more secure, Apple has crossed a significant threshold. Technologies the company has adopted protect Apple customers' content so well that in many situations it's impossible for law enforcement to perform forensic examinations of devices seized from criminals. Most significant is the increasing use of encryption, which is beginning to cause problems for law enforcement agencies when they encounter systems with encrypted drives.

"I can tell you from the Department of Justice perspective, if that drive is encrypted, you're done," Ovie Carroll, director of the cyber-crime lab at the Computer Crime and Intellectual Property Section in the Department of Justice, said during his keynote address at the DFRWS computer forensics conference in Washington, D.C., last Monday. "When conducting criminal investigations, if you pull the power on a drive that is whole-disk encrypted you have lost any chance of recovering that data."
Mass-market cryptography hasn't been thought of as a potential threat to law enforcement since the "crypto wars" of the 1990s. Back then there was a very public battle against U.S. laws and regulations that limited the use and export of cryptographic technology. On one side, civil liberties groups and business interests said that the public needed strong cryptography to protect privacy and financial transactions. On the other side, law enforcement organizations warned that the same technology would empower drug dealers, kidnappers, money launderers, and terrorists.

Law enforcement lost the crypto wars: today there is essentially no restriction on mass-market cryptography. Fortunately, few of the predicted horribles came to pass. One reason is that the encryption systems developed and sold to consumers over the past 20 years have had an Achilles' heel: there has been no good way to let users securely manage encryption keys. Cryptography, for all its power, provides no security unless the keys used to lock the data remain secret.

Enter the iPhone. Apple's security architecture is so sturdy, and so tightly woven into its hardware and software, that it is both easy for consumers to use encryption on their phones and very difficult for someone else to steal the encrypted information.

At the heart of Apple's security architecture is the Advanced Encryption Standard algorithm (AES), a data-scrambling system published in 1998 and adopted as a U.S. government standard in 2001. After more than a decade of exhaustive analysis, AES is widely regarded as unbreakable. The algorithm is so strong that no computer imaginable for the foreseeable future—even a quantum computer—would be able to crack a truly random 256-bit AES key. The National Security Agency has approved AES-256 for storing top-secret data.

Apple did not respond to requests for comment on this story. But the AES key in each iPad or iPhone "is unique to each device and is not recorded by Apple or any of its suppliers," the company said in a security-related white paper. "Burning these keys into the silicon prevents them from being tampered with or bypassed, and guarantees that they can be access only by the AES engine."

What this means in practice is that when iOS devices are turned off, the copy of the encryption key in the computer's accessible memory is erased. That is why an investigator who gets a suspect's phone would have to try all possible keys—the task deemed impossible by the NSA.

The iPhone and iPad do keep a copy of the encryption key deeper in flash memory—otherwise there would be no way for the device to recover data when it was turned back on. But that encryption key is itself protected by the user's "PIN lock," a code that must be entered before the device can be used.
The iPhone always supported a PIN lock, but the PIN wasn't a deterrent to a serious attacker until the iPhone 3GS. Because those early phones didn't use their hardware to perform encryption, a skilled investigator could hack into the phone, dump its flash memory, and directly access the phone's address book, e-mail messages, and other information. But now, with Apple's more sophisticated approach to encryption, investigators who want to examine data on a phone have to try every possible PIN. Examiners perform these so-called brute-force attacks with special software, because the iPhone can be programmed to wipe itself if the wrong PIN is provided more than 10 times in a row. This software must be run on the iPhone itself, limiting the guessing speed to 80 milliseconds per PIN. Trying all four-digit PINs therefore requires no more than 800 seconds, a little more than 13 minutes. However, if the user chooses a six-digit PIN, the maximum time required would be 55 days; an eight-digit PIN would require more than 15 years. That's good enough for most corporate secrets—and probably good enough for most criminals as well.
"There are a lot of issues when it comes to extracting data from iOS devices," says Amber Schroader, CEO of Paraben, a supplier of forensic software, hardware, and services for cell phones. "We have had many civil cases we have not been able to process ... for discovery because of encryption blocking us."

Another iPhone innovation has to do with how and where data gets encrypted. Years ago encryption wasn't used very often because it was difficult to implement and computationally expensive—it took a lot of resources. Not so with the iPhone. Apple designed iOS devices so that the hardware that encrypts data is in the path the data travels when it moves from flash storage to the iPhone's main memory. This means that data can be automatically decrypted when read from flash into memory and reëncrypted when saved from memory back to flash. On the iPhone, encryption is essentially free.

That makes it possible to offer services like Foxygram, an iPhone app that allows users to share encrypted data in the knowledge that it cannot be intercepted and provided to law enforcement. Markus Kangas, cofounder of the app's creator, FoxyFone, says the goal is to "provide easy-to-use secure messaging for everyone and at the same time protect user privacy." He adds: "We are not there to police people."

Google's Android operating system also supports encrypted storage, but only for some of the data on the phone. More important, there is no key burned into the hardware, so even complex passwords can be broken by extracting them and using a network of a few hundred computers. BlackBerry phones, on the other hand, also have a strong encryption system that can be based on multiple factors in addition to the user's PIN.
But the BlackBerry system is designed for business customers and is harder to use than Apple's, which is made for the consumer market. Now that hardened, military-grade encryption is tough and easy for consumers to use—assuming the user has set a PIN lock that's both long and hard to guess—the nightmare scenario of the crypto wars may finally have come to pass.

Root your Android Smartphone with Simple Easy Rooting Process

Be the first to comment!
Labels: ,

How to Root your Android Smartphone with Simple Easy Rooting Process

Today, we are going to show you How to Root your Android Smartphone with simple easy rooting process. Before going to see this procedure you need to know little introduction of Android. Android is the latest buzzword that has caught by its storm. This Google proprietary OS has been based on Linux kernel and today we will be addressing the issues related to rooting.

A standard Android device come shipped with the custom user access and permission and the process of gaining the root access of the Android OS is called as rooting. There are a number of steps that must be followed very carefully so that you don’t destroy your device. Another misconception that is doing round these days is that the rooting involve the loading of custom ROM like CyanogenMod. The process of rooting doesn’t necessarily means that you have to wipe off your internal storage or something like that. It is much similar to jail breaking an iPhone were you are given the root access to the OS and you can perform variety of OS specific tasks. It give you special ability to perform special tasks like securing file system, installing custom ROMs and increase the performance of your mobile much more.
Demonstration of Rooting an Android

Before you start the process of rooting, ask this question to yourself that you really need to root your device or not???? . If the answer is yes, then you must proceed with the steps involved in rooting. Else you should keep the phone as it is. Also keep this thing in mind that there are specific methods for rooting for different mobile devices. This might void the warranty of your device if you don’t follow the steps and protocols. And if the rooting process is stopped at the middle due to any error, it may lead to damage all your entire software in your phone. So that you need to open the device by using factory recovery mode but you may loose all your contacts, apps and important data which in stored in internal storage media.
Rooting your device will void its warranty. In addition, performing the rooting procedure incorrectly may have unexpected consequences. Please follow this guide at your own risk. We will not be responsible if your device gets damaged or bricked during the process.
Next step involves backing up of all the important data that you might need in the future. Also upgrade your phone to the latest version of the Android. To do this go to Setting-> About Phone-> System Updates-> Check Now. Also make sure that you have at least 25MB of the storage space free before doing this. Else this process won’t take place.
Now let’s start with this Rooting process on your Android Device and Follow the simple steps and we will guide you to finish your task.

1. Download the version of SuperOneClick from their website. Save it on your desktop. Don’t start its installation yet. Download it here 

2. Now connect your device to your computer via the USB connection and turn the USB debugging mode on. Also un-mount SD card.

3. Now install the SuperOneClick software. If you own a Samsung device, then select the Samsung Captivate tab, else you should choose Universal tab. HTC phones can be rooted by using Unrevoked tool only.

4. Last but not the least, click on the Root button and wait for some time because the rooting is a lengthy process. Scroll through activity log and you should see OK after each activity. Ignore any warnings that might come.

5. After the rooting is finished, reboot your device and that’s it! You are now the super user of your android phone.

How to Install Android 4.0.4 ICS Update on Samsung Galaxy ACE S5830 CyanogenMod 9 Firmware

Be the first to comment!
Labels: , ,
Today i will guide you how to Install Android 4.0.4 ICS Update on Samsung Galaxy ACE S5830 with CyanogenMod 9 Firmware Rom. We have good news for Samsung Galaxy Ace S5830 users, now you can install Android 4.0 Ice Scream Sandwich ICS OS on Galaxy Ace with the help of flashing the software. Already Samsung stated that there is no ICS update for Galaxy Ace due to low hardware specifications. So Its very excitement that Cyanogen Mod 9 will give you maximum potential that you can enjoy a lot and able to see hidden settings in your phone. You can do that all steps with given steps, its so easy. if you have any error or confuses then you comment below and we will solve your problems. Below you can see the phone status from which firmware and kernel it was running and how much ram will be going to be use in this ROM.
 

Its previews version have some bugs and errors so that all bugs and errors are solved in this version. (i.e Camera was not working in old ROM) and one more think is important that is this ROM can be installed only on rooted devices.

Before the Update your Device, first note that your device your device should be already rooted. then you will also need to wipe data so that your new unofficial CyanogenMod Mode 9 based ICS Beta 8 firmware install easily. Now you can upgrade your device to ICS if you need any help then just use our comments area. we will always help you. 

Features of CyanogenMod 9 ROM

With this ROM you can enjoy new futures like boot, GSM (phone/messages/GPRS/EDGE/3G), Wi-Fi, Bluetooth, HW Acceleration (full), Sound, Headphones, GPS. All sensors like (proximity, rotation etc), Cyanogen Mod settings (not all, it’s not fully merged by CyanogenMod team, not my fault), Market (now you can download all apps available for Gio with GB), Fixed animations (now it looks so good), Facebook sync, Buttons backlight, GMail fully works, Browser fully works, ICS keyboard Games.

Update Galaxy ACE S5830 to CyanogenMod 9

Step 1. Download the zip file for the ICS CM9 from here. Click Download. The file name should be the Samsung-Galaxy-Ace-ICS-CM9-Beta-8.zip file which was 125mb file size. Click Download and save it on your PC.

Step 2. Now connect the smartphone to your computer and then move the above firmware zip on the phone’s SDcard. Now disconnect the device from the PC and then proceed and power off the phone.

Step 3 Enter into recovery mode by pressing and holding the menu center button and power button together. In case it boots into normal mode, then you should repeat the action. Remember that this should be done when the phone is OFF.

Step 4 When Clockmod Recovery shows it main screen you need to select the option that says ‘install zip from sdcard’ and then ‘choose zip from sdcard’. Select the zip file you’ve moved at step 2 and then confirm the installation of the new firmware files.

Step 5 When the update is complete you need to get back to the main recovery menu and select ‘reboot system now’. Please note that your phone will perform its first boot with the new custom ROM. Also, this might take a while before loading all the apps and the Android ICS home screen.

However, in case the first boot take too long to load it means that something went wrong and you will need to repeat all the above steps.

That’s it, you have installed CyanogenMod 9 with Android 4.0.3 ICS on your Samsung Galaxy Ace S5830. If you have any problems on this rom comment here we will find solution for your problem.

Create Annotated Screenshot Based Tutorials in Your Browser with IORAD

Be the first to comment!
Labels: , ,

IORAD is a web services that lets software developers, bloggers or just about anybody to easily create interactive tutorials or instruction manuals of software products. Unlike traditional desktop based screen casting tools or screenshot capture programs, IORAD works from within the browser. Even though browser based, IORAD is capable of taking screenshots of any programs window running on the computer. Once a recording session begins, IORAD automatically captures screenshots of every mouse and keyboard movements such as typing, scrolling and clicking. These are then arranged in a slideshow and appropriate captions automatically added. The end result, which is fully editable, resembles a PowerPoint like slideshow with step-by-step instructions which can be embedded on any website.

Head over to IORAD’s website and sign up for a free account. The website will ask you are some permissions to run additional programs like Java. Once these are taken care of, select the window you wish to record from the drop-down list.

iorad-1

If you haven’t already started the program, you may want to do it before you begin IORAD’s screen recording program so that IORAD can detect the program window. Alternatively, you can ignore the “select window to record” prompt and click the blinking red record button. This will take you to a recording window on the desktop. Anything you perform within the recording window will be recorded. You can resize this window or go full screen to capture everything in your screen. When you are ready to begin, click the Record button.

iorad-2

The thing to keep in mind is that IORAD is not a screen casting program. It doesn’t make a video recording of the screen, rather it records your interaction with items on your screen by taking screenshots. So you don’t have to worry about proceeding too fast or too slow. Proceed at your own pace. Once you are done, click on the Done on the recording window.

You will be then taken to the editing program. Here you can annotate slides, add captions, add actions that might not have been captured such as mouse hover, dragging and clicking. Basic actions are automatically annotated. For example, during the recording if you click on a button that says “Submit”, IORAD will have a screenshot of that action and the image will already have a caption that reads “Click Submit”. Additionally, the “Submit” button will be highlighted by a orange rectangle.

iorad-3

When you have completed editing, save the tutorial and grab the embed code to embed it in your website or blog or simply point to the tutorial hosted on IORAD. Watch this simple tutorial I created.

Currently, there is no way to export the tutorial out of IORAD but this feature is expected to become available for paying customers sometime later.

Remove Vocals From Music to Create Your Own Karaoke: Audacity vs Vocal Reducer

Be the first to comment!
Labels: ,

Removing vocals from songs is generally a simple process, but results can vary widely depending on the instruments used and whether or not the voice is center-panned. Usually vocals are placed in the “center” of the stereo, meaning, they are equally distributed in both the left and right channels. The vocal on the left channel is the exact replica of the vocal on the right channel. Instruments, however, are distributed unevenly. When that happens, it’s simply a matter of subtracting one channel from the other, and the vocal is almost completely removed.

Vocal Reducer is a free software that anybody can use to quickly remove vocals from songs. But before we see how Vocal Reducer works, we will try to do the same using Audacity and then find out how the results compare.

Remove Voice Using Audacity

  1. Import your stereo file into Audacity.
  2. Open the track menu (click the arrow next to the track title), and choose “Split Stereo Track.”

    audacity-1

  3. Select the lower track (the right channel) by clicking it in the area around the mute/solo buttons.

    audacity-2

  4. Choose “Invert” from the Effects menu.

    audacity-4

  5. Using the track menus, change each track to “Mono.”

    audacity-3

Press the Play button. If the music file is just right, the voice will be gone but most of the other instruments will be unaffected, just like a karaoke track. You can now use the Export command in the File menu to save the results.

Remove Vocals Using Vocal Reducer

An undesirable side effect of voice removal using Audacity is that bass is removed from the song along with the vocals because like vocals, bass is often mixed in dead center. With the bass portion removed, bass guitars, kick drums and similar low frequency instruments are also removed. This can be avoided by using a low-pass filter that allowa very low frequencies to “pass through”. In other words, low frequencies below a certain threshold will not be removed when the stereo channels are subtracted from each other. This function is provided in Vocal Reducer. As a result, Vocal Reducer retains the bass and hence karaoke music generated using this program sounds much better than those produced by Audacity.

The program is straightforward to use: load the stereo MP3 file into Vocal Reducer and then click on the Vocal Reducer button.

vocal-reducer

The default settings are perfect – voice attenuation at 100%, gain at 100% and the threshold of the low-pass filter set at 200 Hz. Click OK to process the music file. When it’s done, your Karaoke will be ready.

Vocal Removal: Comparison between Audacity and Vocal Reducer

Notice the lack in bass and general loss in quality when the music is processed with Audacity. The output of Vocal Reducer is significantly better.

Sources: Audacity help, Renegade Minds

How to Reverse Tether: Use PC’s Internet Connection on your Android Phone

Be the first to comment!
Labels: ,

tether-androidTethering is the ability to share your mobile phone’s Internet connection with other devices such as laptops via the USB cable. When tethering is done over Wi-Fi, it’s called a wireless hotspot, a term I’m sure you are all familiar with. Since a typical household has more than one Internet capable device, sharing of Internet connectivity is a great way to reduce cost incurred by the ownership of multiple Internet connection. But as it happens, mobile data plans are usually expensive compared to broadband/ADSL plans. So you stand a better chance at saving if the sharing is made the other way round – that is, from the PC to the mobile device. If you have a wireless router at home and your mobile device supports Wi-Fi connectivity you are already set. But if any one of these key components is missing you will be unable to share your PC’s internet connection with your mobile. This is where reverse tethering comes in.

Reverse tethering allows a mobile device to use the Internet connection of the computer it is tethered to via USB. Reverse tethering is useful if the mobile device's own Internet connection is slow due to low signal reception or if the data package is capped and expensive.

Preparation

To reverse tether, you will need a rooted Android phone with SuperUser installed. You will also need a desktop or laptop computer running Windows and a working Internet connection on it.

If this is the first time you are connecting the phone to the computer through USB, you will need to install the USB drivers. Generally, USB drivers are supplied by the device manufacturer together when you buy your phone. If you don’t have the USB drivers, search and download the proper drivers for your phone model.

Instructions

On your Android phone/device enable USB debugging by going to Settings > Applications > Development > USB Debugging.

Connect your phone to your PC using a USB cable.

Download the Reverse Tethering tools (download link 3.34 MB) and extract the contents of the ZIP file to a folder on your computer.

Inside the folder you will find AndroidTool.exe. Run the file and click on the Refresh Devices button. Your Android device should show up as a string of numbers. If there is only one Android device connected you would know. If there are more than one Android devices connected, please disconnect the rest of the devices except the one you want to reverse tether.

android-reverse-tether

Click on the Connect button. This will install the latest android package and the dependencies (busybox and redsocks) on the connected Android phone.

At this point, the SuperUser process may ask you to allow “USB tunnel”. Please do so. If it doesn’t or the Reverse Tethering application fails to connect to the device, open the USB Tunnel app that should be installed on your phone. This should trigger the SuperUser process asking for Superuser rights.

android-reverse-tether2

If the android process crashes after receiving Superuser rights, close the windows program and start again.

Assuming everything went right, you should be connected to the PC’s broadband connection.

What works:

  • Browsing, HTTP downloading, SSL connection and email. Google Chrome might refuse to work.

What doesn’t work:

  • Downloading and installing apps from Google Play/Market doesn’t work, although you can browse the store.
  • ICMP packet (PING) doesn’t work
  • Skype doesn’t work

[via XDA Developers]

Dialogues Too Quiet, Action Too Loud? Use VLC Media Player to Fix it

Be the first to comment!
Labels:

An issue commonly faced when watching movies at home is the wildly fluctuating audio volume. Dialogues are often soft and barely audible, while action scenes are loud enough to blow out your ear drums. This usually occurs when you play a DVD or Blu-Ray with 5.1 sound through a 2.1 stereo system, or if your home theatre system is improperly calibrated. The audio in movies is designed for surround setups having conversation in a separate channel, usually the central speaker, and sound and music in other channels. With the right gear your home movies will sound very much like in a theatre. But on a 2.1 system, the experience is far from ideal. Thankfully, it is possible to mitigate the sound issue by using a technique know as Dynamic Range Compression.

Dynamic range compression, also called DRC, is a technique that reduces the volume of loud sounds or amplifies quiet sounds by narrowing or compressing an audio signal's dynamic range. DRC is often used in broadcasting and music studios, and also commonly included on DVD-players and music players in cars.

While dynamic range compression is best achieved with hardware compressors, it is possible to digitally alter the range in software, just like digital equalizers in media players. Dynamic range compression is available in VLC Media Player. To get to it, click on the Tools menu and then click on Preferences. On the bottom left corner of the window, choose “Show all” settings. Then go to Audio > Filters > Compressor.

vlc-DRC

Here you will find a number of parameters which are explained below along with their ideal values as suggested by some Reddit users. But you may need to play around with the settings and test it with an actual video file.

  • Threshold: This sets the point at which the dynamic range compression kicks in. Below the threshold volume the compressor on VLC media player does nothing. When the amplitude of the audio exceeds the threshold the player will reduces the volume automatically to keep the signal from getting much louder. Threshold is set in dB, where a lower threshold means a larger portion of the signal will be treated compared to a higher threshold. Set this value to near –20dB.
  • Ratio: The Ratio controls by how much the loudness and quietness of the affected range will be reduced. A ratio of 4:1 means that if input level is 4 dB over the threshold, the output signal level will be 1 dB over the threshold. If you set it to a high level such as 20:1, sounds as loud as 20 dB over the threshold will be brought down to mere 1 dB over threshold effectively bringing down all loud sounds to a comfortable level.
  • Makeup gain: Since a compressor can only reduce the volume when the incoming signal is too high, fixed amount of makeup gain is added to the output so that low sounds can be brought up to an acceptable level. Set the makeup gain at 12 dB or higher depending on how quiet the dialogues are in the movie.

Leave the Attack and Release time at the default level. Finally, play a movie and test out the new settings. You will most certainly notice an improvement in the audio levels. You might have to go back and adjust the sliders a bit. The rule of thumb is to keep threshold low, ratio high and makeup gain at a medium range.

Related: Things you didn’t know VLC media player can do

Change Default Drag and Drop Behavior in Windows Explorer

Be the first to comment!
Labels: ,

Drag-and-drop functions in Windows are handled differently in different situations, and some people seems to have trouble predicting what will happen when they drag a file. Will a drag-and-drop result in a move or copy? Although the behavior might seem random, it’s not.

When you drag a file between two location and both locations are on the same drive, then the operation results is a move. When you drag a file between two locations and both locations are on different drives, then the operation results in a copy. The behavior is easy to understand: if the source and destination are on the same drive, you are probably rearranging files and so Windows moves the file. If the source and destination are on the different drives, Windows assumes you want to make copies of the file.

But sometimes Windows makes the wrong guess, and so it provides ways by which the user can override the default drag and drop behavior.

Method 1

The default behavior can be overridden by pressing a hotkey during the drag and drop operation.

If Shift key is held down, then the operation results in a move irrespective of the location of the source and destination. If Ctrl is held down, then the operation results is a copy and if both Ctrl and Shift are held down, then the operation creates a shortcut of the dragged files.

Method 2

There is another way to change the default behavior. Instead of using the left mouse button to drag files, use the right mouse button. When you release the button, a context menu will appear asking you to choose what happens to the dragged file. This way you don’t have to remember to press any keys.

drag-n-drop-menu

Method 3

If you want to make drag and drop always result in a particular operation, you can do so via a simple utility called Drag'n'Drop Editor. Run the executable file and choose the operation you want to associate with drag and drop. This will add the appropriate keys to the registry.

drag-n-drop-editor

This will not affect keyboard modifiers for drag-n-drop, but changes keyboard-free action. To restore the default Windows behavior, click on the “Uninstall explorer tweaks” button.

Go Through Audiobooks, Podcasts Faster by Increasing Tempo While Preserving Pitch

Be the first to comment!
Labels: , ,

Sometime ago, NPR wrote a lovely article on how an average person was going to miss almost everything that was ever written, filmed, sung or made. There is only so much time in a lifetime and millions of things to do and hundreds of goals to achieve. Reading is one thing that’s suffers the most, because it takes more than a couple of days to finish a book from cover to cover. Most people can’t even afford to spend a few hours in one task, much less days.

Audiobooks have recently started gaining popularity among readers and, here is the best part – non-readers as well. Audiobooks are far more convenient than normal books - you can buy and download them in a few minutes, and then have them on your MP3 player ready to listen to. You can listen to audiobooks while driving, cooking, showering, eating and during all other activities where reading is impossible.

But then again, there are so many audiobooks to listen and so less time. My suggestion: speed them up. But wouldn’t that increase the pitch of the voice into shrill mickey mousey type? No, it won’t, when you know how to do it.

We will use our favorite audio editing program for that. Fire up Audacity and load the MP3 file of the audio book you wish to speed up.

audacity-change-tempo

Press CTRL+A to select the entire waveform. Then click on the Effects menu and select Change Tempo.

audacity-change-tempo2

Increase the tempo by 25%. You can choose a higher tempo such as 35% or even 50% if the result is still comprehensible. It all depends on how fast or slow the speaker is.

Preview the result before finalizing and adjust the tempo until you are satisfied. Alternatively, you can decrease the length of the audio by time, but keep an eye on the percentage change. Once you are okay with the result, click the OK button to start encoding. This is going to take a couple of minutes at most.

To save the modified audiobook, click on the File menu and click on “Export as MP3”. If you haven’t configured the LAME encoder, you will be asked to specify the location of the DLL file. Download LAME for Audacity and install it. The DLL file in question will be at the installation directory.

audiobooks-speedup2

By increasing the tempo by 25% we have shaved 10 minutes off a 50-minute long audiobook.

Now, doing this for every audiobook you own can be tedious. So here is an automated software that does the exact same thing: MP3 Speed Changer. The benefit of using MP3 Speed Changer is that it’s capable of batch processing. You can load entire folders and sub-folders containing audiobooks. You can also drag and drop MP3 files into the window to process. Additionally, MP3 Speed is capable of writing ID3v1, ID3v2 and APE MP3 tag.

mp3speed

So save time, be well-read.

How to Unblock the Pirate Bay

Be the first to comment!
Labels: , ,

pirate-bayThe Pirate Bay is perhaps the most censored website on the Internet. Recently, a UK high court ordered several ISPs to block the website. Unfortunately, for the recording industry, the news about the forthcoming block was reported on the BBC resulting in a huge traffic spike of 12 million curious visitors in a single day. Similar incidents have occurred around other European countries and elsewhere as well. At present, the Pirate Bay remains blocked – partially - in Belgium, Denmark, Finland, India, Ireland, Malaysia, Netherland, China, and the UK.

Governments will continue to block access to the website despite the relative ease by which such censorship can be circumvented in most countries. Here are some methods that will let you unblock the Pirate Bay.

Proxies

Proxies are no-brainer. People have been using them for decades to bypass blocks in offices and schools. Network administrators know them and so do ISPs but there are so many thousands of them that blocking proxies is a futile exercise. The Pirate Bay alone has hundreds of dedicated proxies. The website PirateReverse.info lists about 150 of them. Just pick one and use it to browse the Pirate Bay unmolested.

Google Cache

Google and other search engines keep a copy of the indexed pages which aren’t and cannot be blocked because they load from Google’s servers rather than from the blocked website. When a website gets blocked, you can always use the cache to retrieve a copy of the site. Let’s assume you want to download Linux Mint by torrents. Go to google.com and Type “linux mint site:thepiratebay.se” to get a list of results for Linux Mint torrents on the Pirate Bay website.

google-cache

Instead of clicking on the links, click the Instant Preview arrow and from the preview click on the cached link. This will load the cached copy of the Pirate Bay page. Thanks to magnet links, you can now directly click on “Get this torrent” link to obtain the torrent file of the download.

TorrentFreak shares another shrewd way to download torrents. As explained in a previous article, magnet links simply contain the hash value of the torrent file and that hash is published on the download page. Just copy the “Info Hash” from the cached page and add “magnet:?xt=urn:btih:” before it to obtain the magnet link. Alternatively, paste the info hash on this magnet link generator to obtain the magnet file.

torrent-info-hash

VPN

There are a several free and commercial VPN service providers with servers located all over the world, commonly in the U.S. Since the Pirate Bay is not yet blocked in the U.S, all you have to do is use a US-based VPN service provider. You don’t have to actually download the torrent over VPN, just use it to access the blocked page. Once you obtain the magnet link or the torrent file, disconnect the VPN connection and download the file. If you intend to download torrents over VPN, make sure your provider allows it.

TOR

TOR is another way to unblock the Pirate Bay, but downloading torrents over TOR is not supported and shouldn’t be attempted. Use TOR to access the blocked page initially and then disconnect from the network to download directly from the peers.

Alternative DNS server

Often ISPs would block only the domain name and not the actual IP address of the website. If that is your case, you can easily circumvent the block by not using your ISP’s DNS resolver. There are many public DNS servers available such as OpenDNS, Google DNS, and others. Read: How to quickly switch between different public DNS servers

Related: Wikileaks blocked? Access it through these mirror sites

Remove Obsolete Notification Area Icons in Windows 7

Be the first to comment!
Labels: , ,

Windows 7 lets you customize the behaviour of the icons that appear on your system tray, also called the notification area. You can configure the icons to remain hidden unless there is notification to display. This reduces the visual clutter on the system tray. The trouble is, Explorer keeps a cache of the icons and over time this cache can grow to hundreds of items. If you right click on the Taskbar and choose “Customize Notification Icon” you can see many obsolete items on the list. Some of these programs you might not even have on your computer anymore.

notification-area-icons

Here is how you can clean up this list.

Open registry editor by typing regedit in the Run box and navigate to the following key:

HKEY_CURRENT_USER\Software\Classes\Local Settings\Software\Microsoft\
Windows\CurrentVersion\TrayNotify

Select IconStreams and PastIconsStream and delete them both.

notification-area-icons-delete

Now you will need to restart explorer, or logoff and login again or restart the computer for the changes to take effect.

This will remove all obsolete icons from the list except the ones already present on the Notification Area. Be aware that any customization you have done will be lost and reset to the default values.

Alternatively, you can use the Notification Area Cleaner for Windows 7 – a simple tool that automates the cleaning process including stopping and restarting Explorer. So you don’t have to reboot the computer or logoff from Windows.

How to Remove Information About Yourself from Google Search

Be the first to comment!
Labels: , ,

Search engines collect information from billions of pages out on the internet. Among these there might be pages that carry information about you - your email, your job, your interests, and even personally identifiable information such as your name, your phone number and your address. A surprisingly large number of people share a disturbingly detailed account of their lives with no one in particular on Facebook, Twitter, Foursquare and dozens of specialized social networking sites. Social networking sites usually offer certain degree of privacy but other sites such as forums and blogs are viewable by anybody and can appear in search results.

erase-name

People have the tendency to reuse usernames when registering on different websites. It is very easy to build up a profile on such a person by searching their username on Google, and following every result the username shows up on. By picking up breadcrumbs, reading remarks and comments left behind on discussion boards anybody can get a fair idea of the person’s interests, where he lives and what he does.

If something compromising about you is on the Internet, first try to remove it from the site where it's appearing. This means that you need to contact the webmaster of the page and ask them to take down the content in question. Remember that Google only indexes information that is already available on the Internet. If the content isn't removed from the original site, people will be able to see it even if it doesn't appear in Google's search results.

To contact a webmaster, find a 'Contact us' link or an email address for the webmaster on the website itself. If you can’t find a contact address, look up a site's webmaster information using a special search called a 'Whois' search. You can perform a Whois search using Google: just search for “whois www.example.com”. Read how to find who owns a website for details.

Once the content is no longer available, go to www.google.com/webmasters/tools/removals and click on “Create a new removal request” and enter the URL of the page you want to remove from Google search. The URL is case-sensitive—use exactly the same characters and capitalization that the site uses.

There can be two scenarios:

  1. The page is removed from the site and now returns error code 404, i.e. Page Not Found.
  2. The page in question still exists but has been updated to remove information about you.

The webmaster tool automatically detects if the page returns error 404 and will ask you to confirm your request.

removepage

If the page still exist, you have to tell Google how the page has changed. For this, Google will ask you to type a word that no longer appears on the live page, but is still in the cached version. For example if the Google cache of the page contains your name which has been removed from the live page, type your name as it appears in the cached version but doesn’t appear on the updated page. Don’t tell Google that "my name has been removed'. Google suggests users to type a single word rather than a phrase as it often more effective.

remove-cache

Confirm the request and then Click Remove Cache. Once your request has been processed and Google confirms that the submitted word no longer appear on the page, the search result will no longer show a snippet, nor will the cached page be available. There is no estimated time frame when this would happen. It can happen as quickly as the next day or take weeks to update.

Before you request removal of your content from Google, you should make sure that the problematic content has been removed from the web. Otherwise, even if your request is successful, the information could reappear in Google’s index after 90 days.

Source: Google

Image credit: BigStockPhoto

How to Find Out Who Owns a Website

Be the first to comment!
Labels: ,

The easiest way to find out who is responsible for a particular website is to ask the webmaster himself or herself. Websites usually have a “contact us” or “about us” page on the site or an email address, contact form or any other means of contacting the webmaster directly. Some webmasters will leave their Twitter ID or link to their Twitter page and Facebook page on the website. If you can’t find any information about the website’s owner, there is another way to find out who owns a particular website.

The web supports a special search called Whois (pronounced as the phrase “who is”) that queries databases called Whois servers that stores information on all domain names registered such as the name of the individual or company who registered the domain name, the IP address of the domain, date of registration and expiry and other related data.

You can perform a Whois search using Google: just search for “whois www.example.com” (without the quotation) and you will find several results from different Whois lookup services. Alternatively, you can directly query the domain on any Whois lookup tool. My personal favorite is www.zoneedit.com/lookup.html

Click on the link above and type the domain name you want to query under Whois and click on the lookup link. This is the result of a Whois query of nytimes.com:

Whois Server Version 2.0

Domain names in the .com and .net domains can now be registered
with many different competing registrars. Go to http://www.internic.net
for detailed information.

Domain Name: NYTIMES.COM
Registrar: MELBOURNE IT, LTD. D/B/A INTERNET NAMES WORLDWIDE
Whois Server: whois.melbourneit.com
Referral URL: http://www.melbourneit.com
Name Server: NS1T.NYTIMES.COM
Name Server: NYDNS1.ABOUT.COM
Name Server: NYDNS2.ABOUT.COM
Status: clientTransferProhibited
Updated Date: 30-aug-2011
Creation Date: 18-jan-1994
Expiration Date: 19-jan-2013

>>> Last update of whois database: Wed, 23 May 2012 05:37:45 UTC <<<

The query returns the registrar under which the domain is registered. A domain name registrar is an organization authorized by their respective domain name registries to manage the reservation of Internet domain names and offer such services to the public. The query also returns the Whois server managed by the registrar.

In our example, the domain nytimes.com is managed by MELBOURNE IT, LTD and the Whois server is located at whois.melbourneit.com, our next stop.

On whois.melbourneit.com, enter the domain name - nytimes.com, in our case - and query the server. This time, the registrar will return detailed information about the domain owner including name, address and phone number. This is the result of a Whois query on nytimes.com.

Domain Name nytimes.com
Creation Date 1994-01-18
Registration Date 2011-08-31
Expiry Date 2013-01-20
Organisation Name New York Times Digital
Organisation Address 620 8th Avenue
New York
10018
NY
UNITED STATES
Admin Name Ellen Herb
Admin Address NEW YORK TIMES DIGITAL
620 8th Avenue
NEW YORK
10018
NY
UNITED STATES
Admin Email hostmaster@nytimes.com
Admin Phone +1.2125561234
Tech Name NEW YORK TIMES DIGITAL
Tech Address 229 West 43d Street
New York
10036
NY
UNITED STATES
Tech Email hostmaster@NYTIMES.COM
Tech Phone +1.2125561234
Tech Fax +1.1231231234
Name Server NYDNS1.ABOUT.COM
NS1T.NYTIMES.COM
NYDNS2.ABOUT.COM

As you can see this is pretty detailed.

However, many registrars offer private registration, in which case the identity of the webmaster is hidden. If the webmaster opted for private registration then instead of the webmaster’s contact information, the contact information of the registrar will be shown in Whois results. In such cases, there is no easy way to identify the owner of a domain/website through Whois.

There is one last option that might work: contact the website’s hosting company and ask for the owner’s information. It’s unlikely the hosting company will tell you but it’s worth a try.

But how to know where a website is hosted? Ask WhoIsHostingThis.com

How to Access Box.net Files From Windows Explorer?

Be the first to comment!
Labels: ,

Box, formerly Box.net, is one of the first cloud storage services of the Internet, launched in early 2005. Box targets enterprise companies with services based around sharing, collaborating, and working with files that are uploaded to Box. Box has a number of features ideal for businesses such as unlimited storage, custom branding, encryption, administrative controls and integrations with applications like Google apps, Gmail, and NetSuite. The service also has a variety of social features such as discussions, groups and an update feed.

Businesses aren’t Box’s only customers - Box also offers free Personal accounts for individuals with 5GB free space. A while ago, Box gave away 50GB of free storage to Android and iPhone users. Unfortunately, Personal accounts do not come with desktop client and file sync, because of which it cannot be used as an automatic online backup service. I have a 50GB Box account that is pretty much going waste.

Then I learned that Box offers WebDAV support on free Personal accounts. Now that is something I could take advantage of.

But what is WebDAV? Web Distributed Authoring and Versioning (WebDAV) is an extension of the HTTP Protocol which allows users to create, move, or change files directly on a server. WebDAV is like the FTP protocol but better. For example, if you want to edit a file on an FTP server, you need to download the file, edit, and upload the revised file. WebDAV allows you to edit the file on the server, without downloading. WebDAV also allows multiple users to work on files without having to configure accounts for each user.

How to integrate Box in Windows Explorer

  1. Open My Computer, right click on an empty space and click Add a network location.

    add-network-loc

  2. Click Next on the welcome screen and then Choose a custom network location.
  3. Type in https://www.box.com/dav in the box and click Next.

    add-network-loc2

  4. Enter your login credentials.

    add-network-loc3

  5. Name your Box location and be done.

box-in-explorer

You can now access your Box storage directly from Explorer. To upload files, simply copy and paste to the folder. Similarly, to download files drag files from your Box folder to a local folder.

With Box easily accessible from Explorer, you can start utilizing the unused space for online backups without the Box client software.

Related:

Put Your Dropbox or Google Drive Folder Inside SkyDrive for Multiple Cloud Backup

Be the first to comment!
Labels: , ,

inception-topWith the recent launch of Google Drive and re-launch of Microsoft SkyDrive customers seeking for online file storage/backup solutions today have more choices than ever. However, “choice” is not the right word.

Cloud backup is not the same as social media or email. Most users don’t have the time to actively follow Facebook, Twitter, Google+, Pinterest and tons of other social networking and sharing sites. Instead, we pick one or two where most of our friends and contacts are active. With email, it’s inconvenient to juggle between multiple inboxes so we stick with one. But with cloud storage, nobody is forcing you to be on Dropbox or on Google Drive alone. You can combine these services together to get lots of free storage.

You get 7GB from SkyDrive (25GB for old users), 2GB from Dropbox (upgradeable to 16GB through referrals), 5GB from Google Drive, 2GB from SpiderOak, 5GB from SugarSync, 5GB from Box, 5GB from AVG Livekive and on and on. If you do the math, there is 40GB~50GB of free storage right there.

You can keep videos on SkyDrive, documents on Google Drive, and pictures on Dropbox. However, if your requirements aren’t big, instead of spreading your files across different services you can use just one service for storage and the rest for mirror backup. If one service goes down or loses your files you can retrieve them from the others.

cloudception

The easiest way to do this is to keep the sync folder of one service inside the sync folder of another service. SkyDrive with 25GB of storage can easily gobble both your Google Drive folder and Dropbox folder together. Or you can keep the Dropbox folder inside the Google Drive folder inside the SkyDrive folder. Anything you want to backup or sync goes into the Dropbox folder, which is automatically synced with Google Drive which in turn goes to your Skydrive storage. In one swoop, you created three backup copies of your files in three different locations. Backups can’t get any more secure.

How to change the sync folder

Dropbox: It’s under the Advanced section in Dropbox Preference.

dropbox-pref

Google Drive: You have to setup the sync folder when you sign in to your account. If you are already signed in, disconnect your account and reconfigure the sync folder.

gdrive-pref

SkyDrive: The sync folder is configured during installation of SkyDrive. To change the location of the folder, you have to uninstall SkyDrive and start afresh.

How to Get Notified When Programs Finishes Processing

Be the first to comment!
Labels: , ,

bellSome programs require several minutes to process data. Usually anything that involves encoding and decoding requires time. File compression, video encoding/decoding, image processing take the most time to get done. Often we have to wait while these programs are processing data. We don’t exactly stare at the screen and twiddle our thumbs, instead we move to other programs that require our attention such as an unfinished Facebook game, but one way or the other, we wait.

The trouble is, there is no way of telling when a program will complete processing. Some programs calculate the approximate time remaining and some show progress bar, but we know better than to trust them. You can have fun listening to elevator music while the progress bar is progressing or replace it with a Nyan Cat, if you are fond of Internet memes. (Tip: you can use Instant Elevator Music as an audible indicator of progress bars. Music stops when progress bar reaches the end.)

If you are using Windows 7, you must have already discovered a wonderful feature. When you are copying files to your computer or downloading files from the Internet using your browser, the program’s icon in the taskbar becomes the progress bar. You can see the state of the download or the file copy job by glancing at the taskbar even when the actual program window is minimized. This might not work for all programs though.

taskbar-progressbar

If the program you are waiting upon uses more than the average CPU time, one way to know when the program finishes processing is to monitor the CPU usage level. If the CPU usage remains high, it indicates the program is running and processing data. If the CPU usage falls, it might indicate that the program has completed processing or stalled or waiting for your response. You can put a large CPU usage level indicator on the taskbar such as SuperbarMonitor or Taskbar Meters to make this easier.

SuperbarMonitor

If you don’t want to keep your eye on the taskbar at all times, there are other alternatives. Maybe you aren’t at the computer anymore and want the computer to sound an alarm when the program completes processing, or you just want the computer to shutdown upon completion without bothering you. Then you can use Marxio Timer.

MarxioTimer

Marxio Timer is an advanced task scheduler that allows you to automate tasks based on various triggers such as time and CPU load. You can have Marxio Timer monitor the CPU usage and when it falls below the predefined level, it will trigger an action. The action can be playing a sound file, displaying a text box, or shutdown/logoff/hibernate your computer. TimeToGoAppi is a similar program and more powerful than Marxio Timer.

Alternatively, you can use Tell When Done – a program specifically designed to monitor CPU usage and notify you when the program has completed processing. You run the program, click on the program window you want to monitor and press a hotkey combination. Tell When Done will start monitoring that program process and when it finds the CPU usage hitting 0%, it will alert you by sound or a message box.

tellwhendone

CPUOff is a another freeware application that monitors the CPU load and initiates computer shutdown if the average CPU load has been found to be below a set threshold for a preset time.

Summary of Program Downloads

Related:

Photo credit: BigStockPhoto

How to Show Detailed (Verbose) Information During Windows Shutdown and Startup

Be the first to comment!
Labels: ,

If you ever had your computer stuck at startup or shutdown, or take unusually long time, you know how frustrating it is because you don’t know what is causing the delay. Unlike in Linux, Windows doesn’t display detailed information during startup and shutdown. However, there is a verbose message switch in Windows. If you flick it on, Windows will start displaying a little more details about what is happening behind the blue screen. For example, if verbose message is not enabled you only see the message “Shutting down” at shutdown or “Welcome” at startup. If verbose logging is enabled, you will receive additional information, such as "RPCSS is starting" or "Waiting for machine group policies to finish...”.

This article will show you how to enable verbose message in Windows.

Enable verbose status messages using Group Policy Editor

  1. Open the Run dialog box by pressing Win+R. In the Open box, type gpedit.msc, and then click OK.
  2. On Group Policy Editor, expand Computer Configuration, expand Administrative Templates, and then click System.
  3. In the right pane, double-click Verbose vs normal status messages.
  4. verbose-message-gpedit
  5. Click Enabled, and then click OK.

Enable verbose status messages using Registry Editor

  1. Open the Run dialog box by pressing Win+R. In the Open box, type regedit, and then click OK.
  2. Locate and then click the following registry key:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
  3. On the Edit menu, point to New, and then click DWORD Value.
  4. Type verbosestatus, and then press ENTER.
  5. Double-click the new key that you created, type 1 in the Value data box, and then click OK.
  6. Quit Registry Editor.

Enable verbose status messages using Startup Shutdown Tracer

The easiest way to enable verbose messages is to use the automated tool Startup Shutdown Tracer. Simply download the program and run the executable file. Click the button “Display information” to enable verbose status messages and the button “Disable messages” to disable it.

startup-tracer

Customize or Add New Shortcuts to WinX Menu in Windows 8

Be the first to comment!
Labels: ,

win8startMost of you know that Windows 8 doesn’t have the traditional start menu or the start button. Instead, you’ve got the start screen. There is but a second menu that is accessible by righting click on the lower-left corner of the screen. This context menu is called WinX menu because it can be launched by the keyboard shortcut Win+X.

The WinX menu has shortcuts to some advanced system functions that are slightly out of reach, for instance, the Control Panel, the Task Manager, Device Manager, Computer Management etc. The entries of this menu is driven by shortcut (.lnk) files present in each Group folder located at C:\Users\$Usename$\AppData\Local\Microsoft\Windows\WinX\. It’s been noticed that you can’t manipulate the shortcuts or add new ones to this folder, because on restart, Windows reverts back to the default entries. Microsoft doesn’t want the WinX menu to be abused by software installers. But there are folks who genuinely want to extend the menu.

winx-menu

Rafael Rivera of WithinWindows dug into the security that protects the WinX menu from third-party invasion – and found a workaround. But first, allow him to explain how the security works.

An approved shortcut – a moniker I made up – is a .lnk file that has the appropriate markings to indicate to Windows “Hey, I’m special.” The marking is a simple 4-byte hash of several pieces of information. From the .lnk itself, two points are collected:

The link’s target application path/file (e.g. C:\Games\Minecraft.exe)
The link’s target application arguments (e.g. –windowed)

The third ingredient is simply a hard-coded chunk of text, or a salt if you will, to keep things interesting. That string is, literally, “Do not prehash links.  This should only be done by the user.”

With these three strings in hand, Windows then glues them together, lowercases everything, and runs them through the HashData function. But you’re probably wondering at this point, what does it compare to?

Let’s shift our focus to .lnk files. We know them as shortcuts to things. But they’re officially called Shell Links and can store a lot of information on other data objects in Windows. More specifically, they support storing a structure of data called a PropertyStoreDataBlock that acts as a container for arbitrary string or numeric key/value pairs. Yep, the “WinX hash” is stored in here. If you’re curious, the key can be defined as such:

DEFINE_PROPERTYKEY(PKEY_WINX_HASH, 0xFB8D2D7B, 0x90D1, 0x4E34, 0xBF, 0×60, 0x6E, 0xAC, 0×09, 0×92, 0x2B, 0xBF, 0×02);

So to tie it all together, Windows – the Shell specifically – iterates through the .lnk files in each GroupN folder; opens them up; pulls out and concatenates the target path, args, and an arbitrary string; then finally hashes the result. This hash is then compared with the one stored in the .lnk to determine if it’s approved. Rinse and repeat.

Was that too long for you? Okay, here is the gist of the thing.

Basically, what Windows does is calculate the hash of the .lnk file and compares it to the hash saved in the .lnk file itself, as metadata. This is like locking the door and leaving the key tied to the lock. So all it needs to be done is calculate the hash of the file using the built-in HashData function and save the calculated hash in the .lnk file. Then copy the shortcut to the WinX folder. Bingo!

To make things easy Rafael Rivera has coded a small tool that does the job of calculating the hash and storing it on the .lnk file. In the next section I will describe how to use the tool.

First, grab the hashlnk.zip file from this page and unzip the contents to a folder. Collect the .lnk files that you wish to add to the WinX menu and move them into the folder where you unzipped hashlnk.exe.

Open command prompt and navigate to the folder where you have hashlnk.exe and the .lnk files. I hope you know the basic DOS commands. Now type: hashlnk shortcut.lnk, where shortcut.lnk is the filename of the .lnk file.

hashlnk_011

Repeat this for all the .lnk files. Once the .lnk files have been patched, relocate them into the Group# folder of your choice at C:\Users\$Usename$\AppData\Local\Microsoft\Windows\WinX\.

Restart the computer or re-login to put the changes to effect.

winx-folder

Missing MSVCR100.DLL File

You’ll get this message if you don’t have Visual Studio 2010 or later installed. To workaround the missing DLL file (and missing Visual Studio 2010), get a Windows 7 machine, download MSVCR100.DLL file from here, copy it to the folder containing hashlnk.exe and execute the hashlnk commands on the Windows 7 machine.

The downloaded MSVCR100.DLL file is compatible only on Windows 7. If you want to run the hashlnk file on Windows 8, you have to have Visual Studio 2010 installed.

Customizing Entry Names

You’ll notice that the entries do not show up by the program’s shortcut name. For instance, MS Paint show up as “Create and edit drawings” in the menu and Google Chrome as “Access the Internet”.

To customize these entries, right click on the .lnk file and edit the Comment field.

lnk-file-comment

 

Recent comments

Recent comments

Followers

Sponsors

Recent comments

fefew

Recommend on Google

Copyright © 2011 All Rights Reserved Thesis skin. by Nitin. Converted into Blogger Template by TheTechFizz.