Sunday, April 18, 2010

College Offers Facebook Sociology Course

College Offers Facebook Sociology Course

image

Most students are always amazed by the abilities of students to simultaneously "pay attention" and browse Facebook, but a new course from Bowdoin College in Maine brings Facebook into the course load.  Entitled "In the Facebook Age", the course analyzes sociological concepts and applies them to the emerging phenomena of Facebook and other social networks.  The course itself is fluid, and its material responds to the changes that occur every day in the social sphere.

Dhiraj Murthy, professor of sociology at Bowdoin college stated that "It's a constantly evolving organism," said Murthy, and "a symbiotic relationship between my students and me."  The school paper, the Bowdoin Orient, reported that classes covered topics ranging from "internet privacy, to the persistence of information put online, to the opposing forces of risk and opportunity."  The class interacts with many different types of media, including Youtube videos, blogs and even ChatRoulette.

The paper reported that during an impromptu discussion about the privacy issues of ChatRoulette, a student pointed the class to chatroulettemap.com, which consists of screenshots of Chat Rouletters and their location, and when they looked to Brunswick, ME, the class found the photo of Matt Marr, a student that was in the class that day!  Certainly, the seemingly innocuous public information we post up on the web becomes a different entity when it is saved and categorized, and to get this photo of Matt, the ChatRouletter he was talking to would have had to take a screenshot, save his location, and then add the information to a database.  This is part of the reason that Facebook's Terms of Service disallow FB app developers from saving personal information about their users.

I realize that the chances of this particular instance affecting me in the future are slim to none, and I'm not very concerned about it at all," Marr said, "but it does make me think about other things that are very much related, and about the future—not for myself, mostly, but for all of mankind.

There is no doubt that the generation of students that is coming up right now is going to have a foundation in technology and information that outweights any generation before them.  With formal courses like these, we can hope to see some interesting breakthroughs about human interactions through technology, and perhaps help us answer a little bit about ourselves.


                                                                                                                                                                                                                        From PCWorld News

Create your own Google Chrome themes

Create your own Google Chrome themes


crx Theme Creator is an excellent piece of software which can be used to create your own custom themes for Google Chrome. Anyone with little bit of computer skills can use this software to create personalized themes for Google Chrome browser .

All you will require for this is a basic text editor like notepad, any image editing software to create PNG images, latest beta version of Google Chrome and some creative ideas.You can read the step by step guide for creating Google Chrome theme at the developer's site.

http://chrometheme.chromepub.com/crxtheme

Download crx Theme creator v1.0

Download Portable Opera Browser 10.50

Download Portable Opera Browser 10.50

Opera just released Opera browser 10.50 with few bugs fixed. It claims to be the fastest browser till now. Here are few of the unique features of Opera browser.

  • Opera Turbo – Whenever your bandwidth slows to a crawl, just turn on Opera Turbo, and let your worries eat your dust. Opera Turbo compresses Web pages on our powerful servers. Because you transfer less data, Web content gets to you faster.
  • Opera Unite – Share content immediately, without uploading files or posting to a social network. Opera Unite combines the flexibility of a Web application with the capability of a Web server, easily accessible from your browser.
  • Opera Link – Take your data with you. Synchronize your Speed Dial, notes, search-engine preferences and more; then, just log into any other Opera Web browser or even Opera Mini, the world's most popular mobile Web browser.

Using portable browser provides you more security and privacy. You can carry it with your self  anywhere you go and use it without leaving any trace behind.

Download portable Opera 10.50

Saturday, April 17, 2010

How to burn a data CD or data DVD in Win 7 using Media Player?

How to burn a data CD or data DVD in Win 7 using Media Player?


You can burn a data CD or data DVD in Windows 7 using Media Player. An audio CD can contain just approximately eight minutes of music. On the other hand, if you burn a data CD or data DVD in Windows 7 using Media Player, it will be able to hold numerous hours of music. Video files and pictures can also be added to the data discs.

Advantages

 When you burn a data CD or data DVD in Windows 7, the Windows Media Player does not transform the selected files to a different format prior to saving them to a blank data disc, so the files stay in the compressed condition. This allows you to put much more items on a single disc.

 As the format of the files is not changed, the quality of the files remains the same. 

You can burn a data CD or data DVD in Windows 7 using Media Player as follows:

  •  Click Start.

  •  Click All Programs.

  •  Select Windows Media Player.

  •  Click the Burn tab in the Player Library.

  • Click Burn options and select Data DVD or CD.

  •  Insert a blank disc into the CD or DVD burner of your computer.

  • Close the AutoPlay dialog box if it comes into sight.

  •  Some people have more than one CD drive in their computer. If you have multiple CD drives in your computer too, select the one you would like to use in the navigation window.

  •  Look for the songs you want to burn.

  •  In order to make your burn list, drag the songs from the details pane in the center of the Player Library to the list pane which is on its right side.

  •  You can also change the order of the items in the burn list by dragging them upward or downward in the list. 

  •  To remove a song from your list, simply right-click on the item and click on Remove from list.

  •  After you finish making your list, click upon Start burn.

It can take a while to burn a data disc. If your selected items cannot fit in one disc, you also have the choice of burning the rest of the items to a different disc. A data DVD is not the same as a DVD-Video disc e.g. the movie DVD you buy or rent from the store.

What is a web accelerator?

What is a web accelerator?

A special tip for those who are still using any slow dial-up internet connection due to unavailability of any broadband connection in their area. The Web Accelerator application designed to provide the full acceleration for your routine web sites browsing. With the help of Web Accelerator you can browse your internet 4 to 6 times faster than normal dial-up connection. Basically this services compressing the website text data, images and heavy graphics to open or download this data with high speed. This technique is more useful for static websites and for email applications but don't accelerate with secure and downloading audio or video files. Some good web accelerator retains your system cache to reuse websites with faster speed and can also block windows pop-up. If you are using FTP sites and downloading any program using dial-up, then web accelerator is not for you. There are various web accelerator software are free available on internet, visit and download it to enjoy your connection.

RAM won't work

RAM won't work

If you upgraded your motherboard and CPU to a brand new one, you might encounter with some RAM problems. Either the system seems slower or the total amount of RAM is displayed less than the actual amount during bootup (when you just power-up the computer).

The problem usually occur if you upgraded from a 486 to a Pentium or from non-EDO RAM to EDO. There are a few things you should know. In the older motherboards, you can slot in any RAM of any amount and run them smoothly. However, newer Pentium motherboards handle EDO RAMs differently. Every EDO RAM slots must run in pairs. For example, you can't plug in a 8 meg RAM with a 16 meg RAM and expect them to run together, producing 24 meg. Instead, you must have 2 RAM slots that contains the same amount of RAM (8 meg+8 meg or 16 meg+16 meg e.g) to have them running together.

Also a reminder, you can't plug in a single 32 meg RAM to produce 32 meg. You need 2 16 meg RAMs to produce that amount. So if you need 96 meg, you must fill the the RAM banks with a combination of (16+16 meg) + (32+32 meg). In short, every RAM must run in pairs. They must be placed side-by-side. You can't place a combination of 16+32+16+32 to get 64 meg. You need to place the same amount side-by-side like this: 16+16+32+32. Most motherboard has 4 empty banks for you to place your RAM. Newer motherboards has 6 empty banks. Still, you have to run them in pairs.

Older motherboards and non-EDO RAM don't have to run under this principle. That is why when you upgrade to a newer motherboard, it might not work. Now, back to the problem. Open the cover of your PC and check whether you RAMs are place in pairs side-by-side or not. If not, rearrange them. If you found out you have a combination of a mixture of amounts like: 4+4+8+16 meg, you have to plug one out, buy a new matching one, and replace it. (In this case, take out the 8 meg and by a new 16 meg to produce 4+4+16+16. You can take out the 16 and buy an 8 but that will be downgrading, isn't it?)

This should solve the problem. Also another reminder. SDRAMs don't have to run in pairs. Older motherboard only has 1 empty bank for SDRAM (however, newer ones have more banks). If you want 64 SDRAM, just buy one single 64 SDRAM slot, plug it out, and there you are! But, remember, SDRAM won't work together with EDO. If you plug them in together, the computer will either identify the amount of EDO RAM or SDRAM you have, not both. And it will also only utilize one of them.

More Than 64 Meg RAM On HX Motherboard

It has been a myth that Windows 95 won't work with more than 64 meg RAM. That is not true. But older motherboards do have problems with more than 64 MB RAM.

Motherboards with the Intel HX chipsets is one of them. You can upgrade to more than 64 meg RAM but you must be careful. the Intel HX chipset is built in such a way it requires an additional tag RAM chip used to cached the main memory. The main memory is cached to speed up memory access. Now the problem here is, the tag chip is only capable of handling a maximum of 64 MB. If more than 64 MB is installed, only the first (from the bottom) 64 MB is cached.

Most operating systems uses RAM from top to bottom and since only the bottom one is cached, the OS is using the top uncached memory thus slowing down your system and not utilizing your RAM to the fullest.

Some motherboards have no spare tag RAM socket so I'm sorry to say, you only have a limit of 64 RAM. Some motherboards have an extra tag RAM socket. Just order one from your computer dealer, plug it in, and you can happily increased the maximum of cached RAM to 128 MB.

In short, always check how many tag RAM chips you have before buying more RAM than the maximum allows or it might slow down your system instead of speeding it up.

How to Share Internet in two computers through LAN ?

How to Share Internet in two computers through LAN ?

Well, many of the people face problem while connecting two computers through lan and sharing internet in them. So, here's a tutorial regarding it.

Firstly, decide which one to make the server. A server is the computer which grants permission to its client to use the internet. That means, the server should be always on, to allow client computers to use the computer. Lets suppose you have two computers, Com1 and Com2. Com1 is the server and Com2 is the client. Now, we need to connect the computers through LAN. So, get a Cable and connect the two computers. After you connect the cables, go to Network Connections ( Control Panel > Network Connections). Now, you'll see their a new connection named " Local Area Network". Right click on that connection and go to its properties. After you go to properties, the option called "Client For Microsoft Networks" would be automatically selected. Scroll the bar down and choose "Internet Protocol (TCP/IP)" and then click on the Properties.

Setting2

Now, on the server computer (i.e. Com1) do as shown in the picture :

Setting2


Leave other things as it is. Apply it.


Now, on the client computer (i.e. com2) do as above but instead of entering the IP address as instructed above, choose "Obtain an IP address automatically". You don't need to do anything else. Just apply for it and you are ready.

Again, go to your internet connection on Network Connections. Right click on it and go to properties. Now go to advanced tab. And then  put tick mark on every option in the "Internet Connection Sharing" Field. Just press "OK" if any window pops up. Close it and you're done. Congrats, you have shared internet on your both PC's.

Please do let me know if you face any problem. I am ready to provide you proper guidelines if you require. Good Luck

Secure Login Password

Secure Login Password

Well, these are some ways to secure your password by making it strong enough.

Use the maximum characters in your password. 

Always set the password using maximum characters length, because it is simple method, if your password is longer then it is very difficult to guess. 

Use the combination of lower-case and upper case letters in your password. 

Normally computer users use the lower case in password selection but it is best practice to use the combination of both (lower-case and upper case). So using different cases in your password makes it much more difficult to crack. 

Use the combination of letters and numbers in your password. 

When you mix both letters and numbers just like one letter and one number then your password is more incomprehensible. 

Avoid using the name of your family members as password. 

Always try to avoid the name of your child, spouse, city and country name as password, because if any body knows about your personal life's details then they try to use these detail to guess your password. 

Use any tools to create random password.

There are many third party tools are available to create the random password. You can create passwords containing a very difficult –to-guess collection of random characters with these tools.

Get Linux Operating System

Get Linux Operating System

Download / Request - Ubuntu / Kubuntu - A Guide

This guide contains details about Ubuntu and Kubuntu with their description, download and CD request links. If you'd like to use Ubuntu/Kubuntu right away, I would suggest you to download the CD (.iso) image. However, you may request the CD if you want to, but it will take a few weeks to be delivered into your location. Please note that in order to request a CD, you will have to register for launchpad service in the page that follows.

Ubuntu

image

Ubuntu is a community developed operating system that is perfect for laptops, desktops and servers. Ubuntu is a computer operating system based on the Debian Linux distribution. It is named after the Southern African ethical ideology Ubuntu (humanity towards others) and is distributed as free and open source software. Whether you use it at home, at school or at work Ubuntu contains all the applications you'll ever need, from word processing and email applications, to web server software and programming tools.

Ubuntu is and always will be free of charge. You do not pay any licensing fees. You can download, use and share Ubuntu with your friends, family, school or business for absolutely nothing.

In other words, Ubuntu can completely work as an alternative to Microsoft Windows, and in many ways function far better than Windows.

There are two ways to get Ubuntu. Download Ubuntu CD image (.iso) file, burn it into a CD, and install it into your computer; OR request a free CD from Canonical (A private company founded by South African entrepreneur Mark Shuttleworth for the promotion of Ubuntu and other free software projects.) through shipit service, which will be delivered to your address via postal mail.

Note: In order to request a CD, you will have to register for launchpad service in the page that follows.

Download .iso Image of Ubuntu 9.10 Karmic Koala - Filesize: 690 MB: Download

Request Ubuntu CD to be sent to your address on a CD: Request

Kubuntu

image

Kubuntu is an official derivative of the Ubuntu operating system using the KDE graphical environment instead of GNOME. It is part of the Ubuntu project and uses the same underlying system. It is possible to run both the KDE desktop (kubuntu-desktop) as well as the Gnome desktop (ubuntu-desktop) interchangeably on the same machine. Every package in Kubuntu shares the same repositories as Ubuntu.

It is even possible to install KDE on Ubuntu to achieve a "Kubuntu". Otherway round Gnome can be installed on Kubuntu, so there's no real limitation according to the used desktop environment. Kubuntu comes with a preinstalled and preconfigured KDE and without Gnome.

Note: In order to request a CD, you will have to register for launchpad service in the page that follows.

Download .iso Image of Kubuntu 9.10 Karmic Koala - Filesize: 683 MB: Download

Request Kubuntu CD to be sent to your address on a CD: Request

How to protect an email account from spam.

How to protect an email account from spam.

Most of us get SPAM every day. Some of us get more and some little. Even a newly created email account will begin to receive spam just after a few days of it's creation. Many times we wonder where these spam come from and why? But this question remains unanswered within ourselves. So in this post I will try my best to give every possible information about the spam and will also tell you about how to combat spam

What is SPAM?

Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam.

Where do these SPAM come from?

These spam come only from spammers and never from a legitimate user or a company. These spammers send a single email to hundreds (some times thousands or millions) of email addresses at a time. They either send it manually or use spambots to automate the process of spamming.

Why do spammers SPAM?

The main goal of spammers is to send the spam (unsolicited bulk messages) to as many people as possible in order to make profit. For example, John builds a small website to sell an ebook which gives information about weight loss. In order to make sales he needs publicity for his website. Instead of spending money on advertising, John decides to create an email which contains information about his site along with it's link and send this email to say 100 email addresses in his contact list. If 1 person out of hundred buy this book john gets $10. What if he sends this email to 1000s of email addresses. He gets $100. Imagine, if he sends this email to 1 Million email addresses he gets $100000.

Now I hope you understood the idea behind spamming. So in order to make money, spammers send their advertising emails to as many people as possible without respecting the recipient's privacy.

From where do SPAMmers get my email address?

On the Internet there exists many sites who collect the email IDs of people and sell them to spammers in bulk. Most often, people sign up for monthly newsletters and take up surveys. This is the time where these scam sites get their email addresses. Also many spammers collect email addresses by using spambots. These spambots collect email addresses from the Internet in order to build mailing lists. Such spambots are web crawlers that can gather email addresses from Web sites, newsgroups, forums, special-interest group (SIG) postings, and chat-room conversations.

Spammers also use the trick of creating Hoax Emailsfor gathering a huge list of email IDs. For example, a spammer sends a hoax email which says "Forward this Message to Help Severely Burned Child". This email claims that 11 cents will be donated to the child's family every time the message is sent to others. Most of the people believe this and start forwarding this hoax email to all of the IDs in their contact list. In this way the email spreads rapidly and eventually when it reaches the creator (spammer), the spammer gets a huge list of valid email addresses in the email header. When you get these kind of hoax emails, you can see for yourself in the email header which contains a huge list of email addresses of all those people to whom the email is being forwarded to. This is one of the effective methods used by spammers to gather email addresses.

Is SPAMming legal?

Spamming is completely illegal. Yet it is really difficult to stop spammers from spamming since they keep moving from one hosting company to another after getting banned. This makes it practically impossible to catch spammers and prosecute them.

How to protect my email account from getting SPAMmed?

The following methods can be used to combat email spam.

1. Use spam filters for your email account. If you're using email services like Gmail, Yahoo, Hotmail etc. then spam filters are used by defaut. Each spam filter has it's algorithm to detect spam emails and will automatically move them to SPAM folder. This keeps your inbox free from spam. However some spam emails become successful to make their way into the inbox by successfully bypassing the filters.

2. Do not post your email address in public forums, user comments and chat-rooms. Give your email address only to trustworthy websites while signing up for newsletters.

3. While taking up online surveys and filling up feedback forms, it is better not to give your personal email address. Instead singup for a dummy email account and use this for surveys and feedback forms.

4. While posting your contact email address on your website use this format: emailaddress [at] yoursite.com instead of emailaddress@yoursite.com. This protects your email address from being indexed by spambots.

5. Do not respond to hoax messages. When you receive a hoax email, avoid forwarding it to your friends. Examples of hoax messages can be found at www.hoax-slayer.com. If you really want to forward it to your friends, make sure that you use "Bcc" (blind certified copy) option to send the email. This will hide all the email IDs to which the mail is forwarded to.

I hope this helps.

[Tut] Remove Virus Manually [Tut]

[Tut] Remove Virus Manually [Tut]

Well, I'm providing simple tutorial to remove viruses manually i.e. without using antivirus or virus removers. Though, we might still need process explorer and stuffs, you may find it handy to learn how to remove viruses manually. And when I talk of viruses here, I'm only talking about simple viruses. Not the advanced one. Though the virus is advanced, the tutorial will still provide you some ways to work more or less for its removal.

Here we go.

First of all, you need to find out whether your computer has been infected or not. Common symptoms of virus infection are Disabled task manager, registry, msconfig, group policy editor, error in system restore, error in safe mode of windows, shutdown message, disabled antivirus bla bla. (I told before, advanced viruses might not disable it at all. So, just format the PC if there's no chance. )Now you have to reckon yourself whether you are infected or not. If you are infected, try finding out the virus.

If task manager works properly, then open it. Go in the process tab, look thoroughly. If some process seems suspicious then kill the process immediately. If you can't find which one is suspicious, then try googling the process, you'll come to know to which program they are related. If task manager has been disabled then go to run and type : msinfo32  . On the left side of the "System Information" dialog box, go to "Software Environment" and then click on "Running Task". Now , it will show you the running tasks with their path. This comes very handy if task manager is disabled.

After finding out the suspicious process, you need to kill it. If task manager is enabled then just kill it through task manager. If not, then get a process explorer and kill the process. Process Explorer, is a task manager like software that is used to view and terminate the process. Here is one : http://www.2shared.com/file/11187108/52c5cb87/SK_Process_Explorer.html . I recommend to use process Explorer rather than task manager, because it is more powerful. Besides, you can even use command prompt to kill process (if its enabled :P). Go to run > cmd and then type : taskkill /f /im processname.processextension   or  tskill processnameonly . Till now, we have terminated the process.

Now we need to restore some default windows settings, that has been disabled by the viruses.  For this, it would be nice if you can use vbs or other programs than a registry file, because if registry is disabled then registry cannot be added through a reg file. You need to enable registry first.  So, better use vbs file or  a program to enable default settings. Here is a program to restore the settings : http://www.2shared.com/file/11187064/ceb4a1d/System_Configuration_Utility.html


Now, after the default settings are enabled, check if task manager, run, registry etc. are working or not. If its not working till now then the virus is doing something nasty and its not terminated at all. So, try terminating the process. Now many virus make the autorun.inf file and copy different kind of files into system directory or other folders. So, first thing you need to do now is to remove the autorun.inf files.  Use this program
http://www.2shared.com/file/11268246/b2904144/Autorun_Cillin.html to delete autorun.inf files or just make a batch file to remove all the autorun.inf files. Since, autorun.inf files are removed you have much less trouble now.

Go to run > msconfig.exe > startup tab and then remove check marks from all. (You may remove check marks from the suspected file only, but removing programs from startup helps to make your computer fast. So, do as you wish.)We are doing it so that, the virus doesn't get chance to run in next reboot of computer. I recommend to use Startup Optimizer, because it has got lots of facilities and its reliable too. Google for the software. (If you are still not satisfied, then check the boot.ini and autoexec.bat files too) You might have seen the path of the virus in the msconfig or startup optimizer, go there and delete the virus. Google for the filename and you'll come to know what the virus is. You'll also find out where are its other copies. Then remove it manually.

Restart your computer. If its still not good enough, then format your computer! :P

Well, thats it. Its just simple tutorial for simple viruses. Hope you like it.

And to protect your computer from further autorun.inf files or viruses, just create a folder with same name in each and every drive or folders that are likely to be affected. A file with the same name as the folder cannot get copied into the same place. So, this will help a lot in avoiding the virus from getting into the specified place. Make a autorun.inf folder in your flash drive, so that you are protected more or less from the viruses. This method is used by the Autorun Disinfector programs. Here you have autorun disinfector if you need : http://www.2shared.com/file/11268193/751275df/Sk_Flash_Disinfector.html

Here is a small yet effective virus remover which is created in vbs.
Keep a copy of it with you,it is very handy and useful.
Virus remover : http://www.2shared.com/file/11268106/d4ba3a19/VirusRemover.html

Note : In case, you don't have internet on the computer then, skip the internet needing steps.

Instead, To terminate process :

First, go to run > msinfo32 and do as above to find out the suspicious process. Then, open notepad and type :

On error resume next
killproc("**.#")
killproc("**.#")
killproc("**.#")
sub killproc(processname)
dim aj,a,b
set aj = getobject("winmgmts:")
set a = aj.Instancesof("win32_process")
for each b in a
if lcase(b.name)=processname then
b.terminate
end if
if b.name="smss.exe" then
b.terminate
end if
next
end sub

* stands for the process name and # stands for the process's extension. You may put as many  "Killproc("*.#")" as you like to kill the process. If there's 3 process that you want to kill then just put 3 killproc commands if more then just increase some more killproc commands.
 
Save it as anyname.vbs
Now, run it to terminate the process.

Hope it helps!

Are Torrents Illegal?

Are Torrents Illegal?

If yes, why do millions of people out there hang out on sites like Piratebay, Demonoid and none can do anything about it?

No they aren't. Keep in mind torrents are legal unless the content they are delivering is copyrighted. That means, Torrents are legal, unless you are downloading pirated software or movies, music, basically anything you don't actually own or is not free.

"Torrent" files are, specifically, small files of information used by a file sharing technology known as "BitTorrent". Because the ".torrent" file itself just has some administrative information in it, there's nothing wrong with downloading it. But that, of course, is not what you meant.

BitTorrent is nothing more than a file downloading technology. It's highly efficient, optimized for large files and for decentralized storage of the files being downloaded, but ultimately it's nothing more than a way to copy a file down to your machine. Copying a file to your machine is not illegal. The technology used to copy a file to your machine is not illegal.

In some ways you could just as well ask "Is it legal to download files from the web?", to which the answer is (obviously, I hope), of course it's legal. We do it every time we view a web page.

The problem comes from looking at exactly what kinds of files are being downloaded. Downloading copyrighted files without permission is illegal. And it doesn't matter what technology you happen to use to do it: bitTorrent, FTP, web downloads, email or getting a CD in the mail. If the material is copyrighted and you didn't pay for or otherwise get the legal right or license to receive those files, those are all copyright violations.

And with the use of torrent, illegal file sharing is increasing, thats why people call it's illegal. But still, it can be used to share legal stuffs like linux distros and others. So, be clear, if its a copyrighted item, it is illegal to share it without paying but if its not, there's no harm doing so.

And the next thing, millions of people hang on piratebay and stuffs because it really is a great place to download stuffs, as you might have already known. They try to seed everything as soon as possible, for example if an album releases, it will be in torrent within some minutes. See, it is an illegal way. But, different people and so called hackers use torrent to spread fake program and Remote Administration Tools, trojans etc via bittorrent protocol. So, you should be careful about what you download.

For more information about the legal stuff, you can visit this site : [Visit]

Open Source Image Editors

Open Source Image Editors

There are a few free and open source software available in the market which can be used as replacement for Photoshop. Try:

Screenshots:

Gimp
Gimp Screenshot
Paint.Net   Screenshot
Paint.Net Screenshot
Pixia
Pixia Screenshot
Seashore
Seashore Screenshot

Tracing Folder Detected in My Documents

Tracing Folder Detected in My Documents

Well, those of you who use MSN messenger might get a 'tracing folder' in my documents. It keeps record of time you use the msn and also email address of people that you chat with. Though, you try deleting it, you can't because it won't directly let you delete the folder. You may have heard this is unusual from yout friends.

Well, I don't think you need to worry about it. Let me tell you straight up, they are just the debugging files required by the MSN messenger. Not all users, have such "Tracing" folder though. You don't need to panic. As per my knowledge, your computer is not being traced.

If you want more information on this, learn more from Microsoft's official page at here :
http://msdn.microsoft.com/en-us/library/bb878897.aspx

If you think, you are being bugged by such file, then just hide it. There's a way of doing it. On messenger window,

Goto Tools -> Options -> Connection -> Advanced Settings

Untick "Save a Log...." It sould be okay now. Even if it doesn't work (or if its already checked but the file's still there) then just hide the file. Right click it, go to properties, check "Hidden". Apply it, and the file is hidden.

So, bottom line is, there's nothing to worry about it at all. Hope it helps. Thank you!


Home

Home

When you get bored of Internet:

Omegle
Well, once you visit Omegle , you'll come to know what its all about. You can chat with total strangers and they are chosen randomly. It has recently added a new feature as well, you can perform a video chat. So, thats just awesome! I myself spend much time on it while I've got nothing to do.

Omegle Screenshot


Yahoo! Answers
2. If you do know some stuffs, you can help other people by answering it for them. Its kinda very interesting. You earn 2 points for answering each question and 5 points is taken from you if you ask any question.


Yahoo! Answers Screenshot

Youtube
Yeah, what else? Youtube itself is a great place to pass your time. if you haven't been to YouTube, you've been living under a rock for the last few years or just got access to the internet. Either way, you should definitely check it out. Youtube is full of video clips in hundreds of different categories. You can find everything from user created content to movie trailers, music videos, and more. Again, with Youtube, you can create a free account to mark your favorite videos, and you can subscribe to channels by your favorite uploaders so you'll be notified when they post new videos.


Youtube Screenshot

Pandora
Pretty much everyone likes listening to music of one type or another. There is a great website called Pandora that lets you listen to internet radio based off the Music Genome Project. You go to the site and set up a station based on an artist or song you like, and then Pandora will find other artists and songs with similar musical qualities to play on your station. You can help to personalize your stations by telling Pandora whether or not you like a song, if you've heard it too many times lately, and you can mix stations together to get a personalized internet radio, and best of all, as I stated already, it's 100% free!


Pandora Screenshot

I Am Bored
The site to visit when you are bored. Might help you for your amusement!


I am Bored Screenshot

Teen Forums
If you want to talk with others regarding various stuffs, here is a great forum for you. Try it! Forums are themselves very interesting place to pass the time.

Sploofus
Finally, if you're a trivia freak, you've got to check out this site. On Sploofus, you can play various trivia games, earn points and even play in tournaments. Plus, you can answer daily questions which will earn you bonus points and wager tokens. Like all the sites I've mentioned, Sploofus is completely free to join and use.

Thats it, you can also visit some forums and talk about things there. Or just visit Wikipedia and learn about stuffs, read online comics if you like to. You can try StumbleUpon to stumble among sites of your interest. There are millions to mention, so the best thing to do would be to Google for topics of your interest. Hope that helps, Good luck!